Performance evaluation of multiparty authentication in 5G IIoT environments

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This article considers the need for secure communications between Industrial Internet of Things (IIoT) devices that operate in 5Genabled environments. 5G networks enable greater data throughput and lower latency, which presents new opportunities for the secure authentication of business transactions between IoT hardware. We propose an approach to developing a flexible and secure model for IIoT components in 5G environments. Using the National Institute of Standards and Technology (NIST) seven layer model of cloud computing, in conjunction with Physically Unclonable Function (PUF) hardware provided via FPGAs, we demonstrate algorithms that replicate common authorisation challenges in 5G enabled IoT scenarios.
Original languageEnglish
Title of host publicationInternational Conference on Cyberspace Data and Intelligence 2019 (CyberDI2019)
PublisherSpringer Verlag
Number of pages15
Publication statusAccepted/In press - 14 Oct 2019
EventInternational Conference on Cyberspace Data and Intelligence 2019 - Beijing, China
Duration: 16 Dec 201918 Dec 2019
http://www.cybermatics.org/CyberCon/CyberDI2019/

Publication series

NameCommunications in Computer and Information Science
PublisherSpringer Verlag
ISSN (Electronic)1865-0929

Conference

ConferenceInternational Conference on Cyberspace Data and Intelligence 2019
Abbreviated titleCyberDI 2019
CountryChina
CityBeijing
Period16/12/1918/12/19
Internet address

Fingerprint

Authentication
Hardware
Cloud computing
Field programmable gate arrays (FPGA)
Throughput
Internet of things
Industry

Cite this

Hill, G., Al-Aqrabi, H., Pulikkakudi Johnson, A., Lane, P., & Liu, L. (Accepted/In press). Performance evaluation of multiparty authentication in 5G IIoT environments. In International Conference on Cyberspace Data and Intelligence 2019 (CyberDI2019) (Communications in Computer and Information Science). Springer Verlag.
Hill, Graham ; Al-Aqrabi, Hussain ; Pulikkakudi Johnson, Anju ; Lane, Philip ; Liu, Lu. / Performance evaluation of multiparty authentication in 5G IIoT environments. International Conference on Cyberspace Data and Intelligence 2019 (CyberDI2019). Springer Verlag, 2019. (Communications in Computer and Information Science).
@inproceedings{0d41a982efdc449ea6ccdd5d218288de,
title = "Performance evaluation of multiparty authentication in 5G IIoT environments",
abstract = "This article considers the need for secure communications between Industrial Internet of Things (IIoT) devices that operate in 5Genabled environments. 5G networks enable greater data throughput and lower latency, which presents new opportunities for the secure authentication of business transactions between IoT hardware. We propose an approach to developing a flexible and secure model for IIoT components in 5G environments. Using the National Institute of Standards and Technology (NIST) seven layer model of cloud computing, in conjunction with Physically Unclonable Function (PUF) hardware provided via FPGAs, we demonstrate algorithms that replicate common authorisation challenges in 5G enabled IoT scenarios.",
keywords = "5G Networks, Computer Security, Multiparty interactions, IIoT, authentication",
author = "Graham Hill and Hussain Al-Aqrabi and {Pulikkakudi Johnson}, Anju and Philip Lane and Lu Liu",
year = "2019",
month = "10",
day = "14",
language = "English",
series = "Communications in Computer and Information Science",
publisher = "Springer Verlag",
booktitle = "International Conference on Cyberspace Data and Intelligence 2019 (CyberDI2019)",

}

Hill, G, Al-Aqrabi, H, Pulikkakudi Johnson, A, Lane, P & Liu, L 2019, Performance evaluation of multiparty authentication in 5G IIoT environments. in International Conference on Cyberspace Data and Intelligence 2019 (CyberDI2019). Communications in Computer and Information Science, Springer Verlag, International Conference on Cyberspace Data and Intelligence 2019, Beijing, China, 16/12/19.

Performance evaluation of multiparty authentication in 5G IIoT environments. / Hill, Graham; Al-Aqrabi, Hussain; Pulikkakudi Johnson, Anju; Lane, Philip; Liu, Lu.

International Conference on Cyberspace Data and Intelligence 2019 (CyberDI2019). Springer Verlag, 2019. (Communications in Computer and Information Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Performance evaluation of multiparty authentication in 5G IIoT environments

AU - Hill, Graham

AU - Al-Aqrabi, Hussain

AU - Pulikkakudi Johnson, Anju

AU - Lane, Philip

AU - Liu, Lu

PY - 2019/10/14

Y1 - 2019/10/14

N2 - This article considers the need for secure communications between Industrial Internet of Things (IIoT) devices that operate in 5Genabled environments. 5G networks enable greater data throughput and lower latency, which presents new opportunities for the secure authentication of business transactions between IoT hardware. We propose an approach to developing a flexible and secure model for IIoT components in 5G environments. Using the National Institute of Standards and Technology (NIST) seven layer model of cloud computing, in conjunction with Physically Unclonable Function (PUF) hardware provided via FPGAs, we demonstrate algorithms that replicate common authorisation challenges in 5G enabled IoT scenarios.

AB - This article considers the need for secure communications between Industrial Internet of Things (IIoT) devices that operate in 5Genabled environments. 5G networks enable greater data throughput and lower latency, which presents new opportunities for the secure authentication of business transactions between IoT hardware. We propose an approach to developing a flexible and secure model for IIoT components in 5G environments. Using the National Institute of Standards and Technology (NIST) seven layer model of cloud computing, in conjunction with Physically Unclonable Function (PUF) hardware provided via FPGAs, we demonstrate algorithms that replicate common authorisation challenges in 5G enabled IoT scenarios.

KW - 5G Networks

KW - Computer Security

KW - Multiparty interactions

KW - IIoT

KW - authentication

UR - http://www.cybermatics.org/CyberCon/CyberDI2019/

M3 - Conference contribution

T3 - Communications in Computer and Information Science

BT - International Conference on Cyberspace Data and Intelligence 2019 (CyberDI2019)

PB - Springer Verlag

ER -

Hill G, Al-Aqrabi H, Pulikkakudi Johnson A, Lane P, Liu L. Performance evaluation of multiparty authentication in 5G IIoT environments. In International Conference on Cyberspace Data and Intelligence 2019 (CyberDI2019). Springer Verlag. 2019. (Communications in Computer and Information Science).