Skip to main content

EAP-Based Bootstrapping for Secondary Service Authentication to Integrate IoT into 5G Networks

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2019)

Abstract

Security aspects must be considered in the next generation of IoT and 5G networks. From the different aspects that can be considered that belong to the area of security, we focus in this work as core aspects, the processes of authentication and key management operations that are essential to establish security associations between end-devices and data services. However, little effort has been put so far into providing a network-independent solution for service access authentication in the field of constrained devices based on IoT such as LoRaWAN, NarrowBand IoT (NB-IoT) and LTE-M in 5G networks. Therefore, this paper proposes a novel architecture based on EAP bootstrapping and AAA infrastructure for IoT and 5G networks to manage service authentication and security association in order to enable secure end-to-end communication. In this work, we propose the use of an improved bootstrapping mechanism for secondary authentication adapted to be compliant with the 3GPP specifications for integrating IoT technologies in 5G networks. We propose the adaptation of LO-COAP-EAP (Low-Overhead CoAP-EAP) as an EAP lower layer for enabling the secondary service authentication with high flexibility, scalability and networks independence.

This work has been partially funded by the H2020 EU IoTrust project under Grant Agreement 825618, the H2020 PHOENIX project under Grant Agreement 893079, the H2020 Fed4IoT project under Grant Agreement 814918, the H2020 PRECEPT project under Grant Agreement 958284, the National GUARDIAN project under Grant Agreement TSI-100110-2019-20, the H2020 Plug-n-Harvest project under Grant Agreement 768735, and also Fundación Séneca de la Región de Murcia FPI Grant 20751/FPI/18.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. 3GPP: Security architecture and procedures for 5G System. Technical Specification (TS) 33.501, 3rd Generation Partnership Project (3GPP) (2018). http://www.3gpp.org/DynaReport/33501.htm. version 15.5.0

  2. 3GPP: Procedures for the 5G System (5GS). Technical Specification (TS) 23.502, 3rd Generation Partnership Project (3GPP) (2019). http://www.3gpp.org/DynaReport/23502.htm. version 16.1.1

  3. 3GPP: System architecture for the 5G System (5GS). Technical Specification (TS) 23.501, 3rd Generation Partnership Project (3GPP) (2019). http://www.3gpp.org/DynaReport/23501.htm. version 16.1.0

  4. Bormann, C., Ersue, M., Keränen, A.: Terminology for Constrained-Node Networks. RFC 7228, May 2014. https://doi.org/10.17487/RFC7228, https://rfc-editor.org/rfc/rfc7228.txt

  5. Chandramouli, D., Liebhart, R., Pirskanen, J.: 5G for the Connected World. Wiley, Hoboken (2019)

    Book  Google Scholar 

  6. Condoluci, M., Dohler, M., Araniti, G., Molinaro, A., Sachs, J.: Enhanced radio access and data transmission procedures facilitating industry-compliant machine-type communications over LTE-based 5G networks. IEEE Wirel. Commun. 23(1), 56–63 (2016). https://doi.org/10.1109/MWC.2016.7422406

    Article  Google Scholar 

  7. Fabio Arena, G.P., Collotta, M.: A survey on driverless vehicles: from their diffusion to security features. J. Internet Serv. Inf. Secur. (JISIS) 8(3), 1–19 (2018). https://doi.org/10.22667/JISIS.2018.08.31.001

    Article  Google Scholar 

  8. Galinina, O., Andreev, S., Komarov, M., Maltseva, S.: Leveraging heterogeneous device connectivity in a converged 5G-IoT ecosystem. Comput. Netw. 128, 123–132 (2017). https://doi.org/10.1016/j.comnet.2017.04.051, http://www.sciencedirect.com/science/article/pii/S1389128617301822. survivability Strategies for Emerging Wireless Networks

  9. Garcia-Carrillo, D., Marin-Lopez, R., Kandasamy, A., Pelov, A.: A CoAP-based network access authentication service for low-power wide area networks: LO-CoAP-EAP. Sensors 17(11), 2646 (2017). https://doi.org/10.3390/s17112646, https://www.mdpi.com/1424-8220/17/11/2646

  10. Gaurav Choudhary, J.K., Sharma, V.: Security of 5G-mobile backhaul networks: a survey. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 9(4), 41–70 (2018)

    Google Scholar 

  11. Hošek, J.: Enabling Technologies and User Perception Within Integrated 5G-IoT Ecosystem. Vysoké učení technické v Brně, nakladatelství VUTIUM (2016)

    Google Scholar 

  12. Kapassa, E., Touloupou, M., Stavrianos, P., Kyriazis, D.: Dynamic 5G slices for IoT applications with diverse requirements. In: 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, pp. 195–199, October 2018. https://doi.org/10.1109/IoTSMS.2018.8554386

  13. Navarro-Ortiz, J., Sendra, S., Ameigeiras, P., Lopez-Soler, J.M.: Integration of LoRaWAN and 4G/5G for the industrial internet of things. IEEE Commun. Mag. 56(2), 60–67 (2018). https://doi.org/10.1109/MCOM.2018.1700625

    Article  Google Scholar 

  14. Palattella, M.R., et al.: Internet of things in the 5G era: enablers, architecture, and business models. IEEE J. Sel. Areas Commun. 34(3), 510–527 (2016)

    Article  Google Scholar 

  15. Storck, C.R., Duarte-Figueiredo, F.: A 5G V2X ecosystem providing internet of vehicles. Sensors 19(3), 550 (2019). https://doi.org/10.3390/s19030550, https://www.mdpi.com/1424-8220/19/3/550

  16. Wang, D., Chen, D., Song, B., Guizani, N., Yu, X., Du, X.: From IoT to 5G I-IoT: the next generation IoT-based intelligent algorithms and 5G technologies. IEEE Commun. Mag. 56(10), 114–120 (2018). https://doi.org/10.1109/MCOM.2018.1701310

    Article  Google Scholar 

  17. Yasmin, R., Petäjäjärvi, J., Mikhaylov, K., Pouttu, A.: On the integration of LoRaWAN with the 5G test network. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–6, October 2017. https://doi.org/10.1109/PIMRC.2017.8292557

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jesus Sanchez-Gomez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Garcia-Carrillo, D., Sanchez-Gomez, J., Marin-Perez, R., Skarmeta, A. (2020). EAP-Based Bootstrapping for Secondary Service Authentication to Integrate IoT into 5G Networks. In: You, I., Chen, HC., Leu, FY., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2019. Communications in Computer and Information Science, vol 1121. Springer, Singapore. https://doi.org/10.1007/978-981-15-9609-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9609-4_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9608-7

  • Online ISBN: 978-981-15-9609-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics