Skip to main content

Design and Security Analysis of Improved Identity Management Protocol for 5G/IoT Networks

  • Conference paper
  • First Online:
Book cover Recent Advances in Information Systems and Technologies (WorldCIST 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 570))

Included in the following conference series:

Abstract

The Internet of Things (IoT) has become a powerful element of next generation networking technologies. In an IoT-enabled environment, things or physical objects no longer stay unresponsive. Instead they are connected to the Internet and embedded with processing and communication capabilities. A great rise of mobile network users is causing identity management problems on mobile service provider through mobile networks. This paper proposes improved I2DM to solve user ID management and security problems on mobile Internet application services over 5G/IoT networks. IIDM protocol breakup loads which made by existing I2DM protocols mutual authentication via mobile operator, via sending some parts to Internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to propose more optimized protocol against further demanding of 5G/IoT mobile networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Third gerneration partnership project: Technical specification group services and system aspects. General Packet Radio Service (GPRS) enhancements for E-UTRAN (release 10), 3GPP, TS 23.401 version 10.7.0, pp. 56–59, March 2012

    Google Scholar 

  2. Third generation partnership project: Technical specification group services and system aspects. Mobile Application Part (MAP) specification (release 10), 3GPP, TS 29.002 version 10.6.0, pp. 139–143, March 2012

    Google Scholar 

  3. Park, I.S., Lee, Y.D., Jeong, J.P.: Improved identity management protocols for secure mobile cloud computing. In: HICSS-46, pp. 4958–4965, January 2013

    Google Scholar 

  4. Dimitriadis, C.K., Polemi, D.: An identity management protocol for Internet applications over 3G mobile networks. Comput. Secur. 25(1), 45–51 (2006)

    Article  Google Scholar 

  5. Hadole, P.A., Rohankar, J., Katara, A.: Development of secure mobile cloud computing using improved identity management protocol. Int. J. Recent Innov. Trends Comput. Commun. 10(2), 645–650 (2014)

    Google Scholar 

  6. He, W.: Single sign on. Networks 33, 51–58 (2000)

    Google Scholar 

  7. Park, J.H., Yang, L.T., Hussain, S., Xiao, Y.: Security for multimedia and ubiquitous applications. Telecommun. Syst. 44(3), 179–180 (2010)

    Article  Google Scholar 

  8. Harihareswara, S.: User Experience is a social justice issue. Code4Lib J. 1(5), 1 (2015)

    Google Scholar 

  9. Kormann, D.P., Rubin, A.D.: Risks of the passport single signal protocol. Comput. Netw. 33(1), 51–58 (2000)

    Article  Google Scholar 

  10. Djellali, B., Chouarfia, A., Belarbi, K., Lorenz, P.: Design of authentication model preserving intimacy and trust in intelligent environments. Netw. Protoc. Algorithms 7(1), 64–83 (2015)

    Article  Google Scholar 

  11. Tanimoto, S., Moriya, T., Sato, H., Kanai, A.: Improvement of multiple CP/CPS based on level of assurance for campus PKI deployment. In: 2015 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1–5. IEEE, June 2015

    Google Scholar 

  12. Koien, G.M.: Mutual entity authentication for LTE. In: IEEE Transaction on Computer, pp. 689–694, July 2011

    Google Scholar 

  13. Huang, C.-M., Li, J.-W.: Authentication and key agreement protocol for UMTS with low bandwidth consumption. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA), vol. 1, pp. 392–397, March 2005

    Google Scholar 

  14. Al-Saraireh, J., Yousef, S.: A new authentication protocol for UMTS mobile networks. EURASIP J. Wirel. Commun. Netw. 2006(2), 19–19 (2006)

    MATH  Google Scholar 

  15. Lin, Y.-B., Chen, Y.-K.: Reducing authentication signaling traffic in third-generation mobile network. IEEE Trans. Wirel. Commun. 2(3), 493–501 (2003)

    Article  Google Scholar 

  16. Al-Saraireh, J., Yousef, S.: Analytical model for authentication transmission overhead between entities in mobile networks. Comput. Commun. 30(8), 1713–1720 (2007)

    Article  Google Scholar 

  17. Zhang, Y., Fujise, M.: An improvement for authentication protocol in third-generation wireless networks. IEEE Trans. Wirel. Commun. 5(9), 2348–2352 (2006)

    Article  Google Scholar 

  18. Choudhary, A., Bhandari, R.: Analysis of UMTS (3G) Authentication and Key Agreement Protocol (AKA) for LTE (4G) network. Int. J. Recent Innov. Trends Comput. Commun. 3(4), 2146–2149 (2015)

    Article  Google Scholar 

  19. 3GPP. http://www.3gpp.org

  20. 3Gpp: TS 33.102., Technical specification group services and system aspects, 3G security, security architecture V6.0.0 (2003)

    Google Scholar 

  21. Skianis, C.: Special issue of telecommunications systems on security, privacy and trust for beyond-3G networks. Telecommun. Syst. 35(3), 87–88 (2007)

    Article  Google Scholar 

  22. Aarts, R., Kavsan, B., Wason, T.: Liberty ID-FF bindings and profiles specification. Liberty Alliance Project, Version 1, 1–61 (2003)

    Google Scholar 

  23. Microsoft Corporations: Microsoft. net passport review guide. Technical report (2003). www.microsoft.com

  24. Kormann, D.P., Rubin, A.D.: Risks of the passport single signal protocol. Comput. Netw. 33(1), 51–58 (2000)

    Article  Google Scholar 

  25. Eastlake 3rd, D., Crocker, S., Schiller, J.: Randomness recommendations for security (no. RFC 1750) (1994)

    Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2016R1D1A1B03933828).

This work was supported R&D Program by the Ministry of Trade, Industry & Energy (MOTIE) and the Korea Evaluation Institute of Industrial Technology (KEIT) (10065737, Development of Modular Factory Automation and Processing Devices toward Smart Factory in Parts Manufacturing Industry).

This work was supported by the Technology Innovation Program (10054486, Development of Open Industry IoT (IIoT) Smart Factory Platform and Factory-Thing Hardware Technology) funded By the Ministry of Trade, industry & Energy (MI, Korea).

This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No. R-20160530-003936, Development of Quality Inspection System based on IIoT Platform for improving Quality in Small and Medium manufacturers).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jongpil Jeong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Song, B., Cheong, Y., Lee, T., Jeong, J. (2017). Design and Security Analysis of Improved Identity Management Protocol for 5G/IoT Networks. In: Rocha, Á., Correia, A., Adeli, H., Reis, L., Costanzo, S. (eds) Recent Advances in Information Systems and Technologies. WorldCIST 2017. Advances in Intelligent Systems and Computing, vol 570. Springer, Cham. https://doi.org/10.1007/978-3-319-56538-5_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56538-5_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56537-8

  • Online ISBN: 978-3-319-56538-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics