Abstract
The Internet of Things (IoT) has become a powerful element of next generation networking technologies. In an IoT-enabled environment, things or physical objects no longer stay unresponsive. Instead they are connected to the Internet and embedded with processing and communication capabilities. A great rise of mobile network users is causing identity management problems on mobile service provider through mobile networks. This paper proposes improved I2DM to solve user ID management and security problems on mobile Internet application services over 5G/IoT networks. IIDM protocol breakup loads which made by existing I2DM protocols mutual authentication via mobile operator, via sending some parts to Internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to propose more optimized protocol against further demanding of 5G/IoT mobile networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Third gerneration partnership project: Technical specification group services and system aspects. General Packet Radio Service (GPRS) enhancements for E-UTRAN (release 10), 3GPP, TS 23.401 version 10.7.0, pp. 56–59, March 2012
Third generation partnership project: Technical specification group services and system aspects. Mobile Application Part (MAP) specification (release 10), 3GPP, TS 29.002 version 10.6.0, pp. 139–143, March 2012
Park, I.S., Lee, Y.D., Jeong, J.P.: Improved identity management protocols for secure mobile cloud computing. In: HICSS-46, pp. 4958–4965, January 2013
Dimitriadis, C.K., Polemi, D.: An identity management protocol for Internet applications over 3G mobile networks. Comput. Secur. 25(1), 45–51 (2006)
Hadole, P.A., Rohankar, J., Katara, A.: Development of secure mobile cloud computing using improved identity management protocol. Int. J. Recent Innov. Trends Comput. Commun. 10(2), 645–650 (2014)
He, W.: Single sign on. Networks 33, 51–58 (2000)
Park, J.H., Yang, L.T., Hussain, S., Xiao, Y.: Security for multimedia and ubiquitous applications. Telecommun. Syst. 44(3), 179–180 (2010)
Harihareswara, S.: User Experience is a social justice issue. Code4Lib J. 1(5), 1 (2015)
Kormann, D.P., Rubin, A.D.: Risks of the passport single signal protocol. Comput. Netw. 33(1), 51–58 (2000)
Djellali, B., Chouarfia, A., Belarbi, K., Lorenz, P.: Design of authentication model preserving intimacy and trust in intelligent environments. Netw. Protoc. Algorithms 7(1), 64–83 (2015)
Tanimoto, S., Moriya, T., Sato, H., Kanai, A.: Improvement of multiple CP/CPS based on level of assurance for campus PKI deployment. In: 2015 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1–5. IEEE, June 2015
Koien, G.M.: Mutual entity authentication for LTE. In: IEEE Transaction on Computer, pp. 689–694, July 2011
Huang, C.-M., Li, J.-W.: Authentication and key agreement protocol for UMTS with low bandwidth consumption. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA), vol. 1, pp. 392–397, March 2005
Al-Saraireh, J., Yousef, S.: A new authentication protocol for UMTS mobile networks. EURASIP J. Wirel. Commun. Netw. 2006(2), 19–19 (2006)
Lin, Y.-B., Chen, Y.-K.: Reducing authentication signaling traffic in third-generation mobile network. IEEE Trans. Wirel. Commun. 2(3), 493–501 (2003)
Al-Saraireh, J., Yousef, S.: Analytical model for authentication transmission overhead between entities in mobile networks. Comput. Commun. 30(8), 1713–1720 (2007)
Zhang, Y., Fujise, M.: An improvement for authentication protocol in third-generation wireless networks. IEEE Trans. Wirel. Commun. 5(9), 2348–2352 (2006)
Choudhary, A., Bhandari, R.: Analysis of UMTS (3G) Authentication and Key Agreement Protocol (AKA) for LTE (4G) network. Int. J. Recent Innov. Trends Comput. Commun. 3(4), 2146–2149 (2015)
3GPP. http://www.3gpp.org
3Gpp: TS 33.102., Technical specification group services and system aspects, 3G security, security architecture V6.0.0 (2003)
Skianis, C.: Special issue of telecommunications systems on security, privacy and trust for beyond-3G networks. Telecommun. Syst. 35(3), 87–88 (2007)
Aarts, R., Kavsan, B., Wason, T.: Liberty ID-FF bindings and profiles specification. Liberty Alliance Project, Version 1, 1–61 (2003)
Microsoft Corporations: Microsoft. net passport review guide. Technical report (2003). www.microsoft.com
Kormann, D.P., Rubin, A.D.: Risks of the passport single signal protocol. Comput. Netw. 33(1), 51–58 (2000)
Eastlake 3rd, D., Crocker, S., Schiller, J.: Randomness recommendations for security (no. RFC 1750) (1994)
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2016R1D1A1B03933828).
This work was supported R&D Program by the Ministry of Trade, Industry & Energy (MOTIE) and the Korea Evaluation Institute of Industrial Technology (KEIT) (10065737, Development of Modular Factory Automation and Processing Devices toward Smart Factory in Parts Manufacturing Industry).
This work was supported by the Technology Innovation Program (10054486, Development of Open Industry IoT (IIoT) Smart Factory Platform and Factory-Thing Hardware Technology) funded By the Ministry of Trade, industry & Energy (MI, Korea).
This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No. R-20160530-003936, Development of Quality Inspection System based on IIoT Platform for improving Quality in Small and Medium manufacturers).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Song, B., Cheong, Y., Lee, T., Jeong, J. (2017). Design and Security Analysis of Improved Identity Management Protocol for 5G/IoT Networks. In: Rocha, Á., Correia, A., Adeli, H., Reis, L., Costanzo, S. (eds) Recent Advances in Information Systems and Technologies. WorldCIST 2017. Advances in Intelligent Systems and Computing, vol 570. Springer, Cham. https://doi.org/10.1007/978-3-319-56538-5_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-56538-5_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-56537-8
Online ISBN: 978-3-319-56538-5
eBook Packages: EngineeringEngineering (R0)