Core Concepts
The authors propose several lightweight authentication protocols tailored for ambient IoT (AIoT) devices in 5G networks, which are designed to accommodate different communication topologies and leverage lightweight cryptographic algorithms like Ascon to strike a balance between security and efficiency.
Abstract
The content discusses the need for dedicated authentication protocols for ambient IoT (AIoT) devices in 5G networks. AIoT devices are characterized by their ability to harvest energy from the environment and have minimal or no batteries, making them highly cost-effective and easy to deploy. However, existing security protocols designed for more capable IoT devices are not suitable for AIoT devices due to their complex key hierarchies and multi-round interactions, which can lead to high power consumption.
The authors propose three lightweight authentication protocols based on sequence numbers, nonces, and physical layer keys respectively. These protocols are designed to accommodate different communication topologies for AIoT devices, including direct communication with base stations, communication through relay nodes, and communication assisted by user devices.
The key highlights of the proposed protocols are:
Utilization of lightweight cryptographic algorithms like Ascon to provide encryption and authentication with a single key, reducing computational overhead.
Support for various cryptographic algorithms to ensure compatibility with existing 3GPP standards.
Informal security analysis demonstrating resistance to attacks like replay, man-in-the-middle, and impersonation, as well as providing identity privacy protection and device authorization.
Performance evaluation showing significant advantages over existing standard protocols in terms of computational time and energy consumption.
The authors conclude that their work can serve as a forward-looking reference for future research and standardization of authentication protocols for AIoT devices in 5G networks.
Stats
The computational time of existing security protocols ranges from 2s to 6s.
The computational time for all of the proposed protocols is under 1s.