Abstract
The Internet of Things (IoT) is a concept that includes physical devices, web-enabled devices, and the entire network of connections that they use to communicate. The IoT enables these objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems. Nowadays, 5G (fifth generation) systems have the potential to make the IoT concept becomes reality. However, it is difficult for the 5G network against eavesdropping due to the characteristics of 5G networks. In this paper, we have proposed the ElGamal Cryptography with Public Key Infrastructure (PKI) techniques on the communication from the Base Station (BS) to Relay Station (RS) and RS to RS, then finally from RS to Subscriber Station (SS) to against replay attacks, man-in-the-middle (MITM) attack and denial-of-service (DoS). Through the discussion on the proposed mechanism and it has the probability to ensure the confidentiality, integrity, availability, and non-repudiation of the transmitted data. We have discussed the performance analysis of the proposed mechanism and given a conclusion on the discussion. From the result, it shows the mechanism can enhance the security level on the 5G networks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
A. Mohammed, Special issue on internet of things: smart things network and communication (2016). Available at https://www.journals.elsevier.com/journal-of-network-and-computer-applications/call-for-papers/internet-of-things-smart-things-network-and-communication
J. Morgan, A simple explanation of the internet of things, May 2014. Available at http://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#738c4f236828
T. Nakamura, A. Benjebbour, Y. Kishiyama, S. Suyama, T. Imai, 5G radio access: requirement, concept and technologies. IEICE Trans. Commun. E98-B(8) (2014)
N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, M. Di Renzo, Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20–27 (2015)
A. Mukherjee, Physical-layer security in the internet of things: sensing and communication confidentiality under resource constraints. Proc. IEEE 103(10), 1747–1761 (2015)
Y. Zhang, Y. Shen, H. Wang, J. Yong, X. Jiang, On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans. Autom. Sci. Eng. PP(99), 1–13 (2015)
A.S. Khan, N. Fisal, Z.A. Bakar, N. Salawu, W. Maqbool, R. Ullah, H. Safdar, Secure authentication and key management protocols for mobile multihop WiMAX networks. Indian J. Sci. Technol. 7(3), 282–295 (2014)
M. Hangargi, Business need for security: denial of service attacks in wireless networks. Masters dissertation, North Eastern University, Department of Information Assurance, 2012
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khan, N.A. (2022). PKI-Based Security Enhancement for IoT in 5G Networks. In: Smys, S., Balas, V.E., Palanisamy, R. (eds) Inventive Computation and Information Technologies. Lecture Notes in Networks and Systems, vol 336. Springer, Singapore. https://doi.org/10.1007/978-981-16-6723-7_16
Download citation
DOI: https://doi.org/10.1007/978-981-16-6723-7_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-6722-0
Online ISBN: 978-981-16-6723-7
eBook Packages: EngineeringEngineering (R0)