Lightweight Continuous Authentication via Intelligently Arranged Pseudo-Random Access in 5G-and-Beyond

36Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Conventional authentication techniques based on cryptography and computational hardness are facing growing challenges for deployment in resource-constrained Internet-of-Things (IoT) devices. The dramatically increased security overhead and latency from the inherent computational processing make these conventional static security techniques undesirable for emerging machine communications. In this paper, we propose a novel lightweight continuous authentication scheme for identifying multiple resource-constrained IoT devices via their pre-arranged pseudo-random access time sequences. A transmitter will be authenticated as legitimate if and only if its access time sequential order is matched with a pre-agreed unique pseudo-random binary sequence (PRBS) between itself and the base station. The seed for generating the PRBS between each transceiver pair is acquired by exploiting the channel reciprocity, which is time-varying and difficult for a third party to predict. Hence, the proposed scheme provides seamless protection for legitimate communications by refreshing the seeds adaptively without incurring long latency, complex computation, and high communication overhead. Our results show that the proposed scheme achieves high entropy and low bit mismatch rate. Finally, we demonstrate the superiority of our scheme over the existing schemes in quantization performance, authentication performance, and computation cost.

References Powered by Scopus

Nonorthogonal Multiple Access for 5G and beyond

1159Citations
N/AReaders
Get full text

Training a support vector machine in the primal

600Citations
N/AReaders
Get full text

Security and Privacy for the Internet of Drones: Challenges and Solutions

304Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Realizing 6G: The Operational Goals, Enabling Technologies of Future Networks, and Value-Oriented Intelligent Multi-Dimensional Multiple Access

38Citations
N/AReaders
Get full text

Lightweight Flexible Group Authentication Utilizing Historical Collaboration Process Information

15Citations
N/AReaders
Get full text

Multi-User Physical Layer Authentication Based on CSI Using ResNet in Mobile IIoT

10Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Fang, H., Wang, X., Zhao, N., & Al-Dhahir, N. (2021). Lightweight Continuous Authentication via Intelligently Arranged Pseudo-Random Access in 5G-and-Beyond. IEEE Transactions on Communications, 69(6), 4011–4023. https://doi.org/10.1109/TCOMM.2021.3065980

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 4

80%

Lecturer / Post doc 1

20%

Readers' Discipline

Tooltip

Computer Science 2

50%

Engineering 2

50%

Save time finding and organizing research with Mendeley

Sign up for free