An end-to-end authentication method for NB-IoT devices over 5G network using whirlpool hash function and physical unclonable function
Abstract
The Narrow-band Internet of Things (NB-IoT) is a high throughput and Low Power Con-
sumption Wide Area Network (LPWAN) radio technology, introduced by 3rd Generation
Partnership Project (3GPP). The NB-IoT and LTE-M technologies continue to evolve
as a part of the 5G speci cations with upcoming releases of 3GPP. The assessment of
security threats such as attacks on inter-operator security, radio interfaces, signaling and
user plane, masquerading, replay, man-in-middle, bidding-down and privacy security is-
sues have been considered for the 5G system. However, there is a scope for improvement
in end-to-end security authentication for 5G NB-IoT. The user identity related issues
are still a concern as the existing authentication protocols provide poor compatibility
with current network architecture. In addition, these protocols demands dual authenti-
cation and key agreements. In this paper, we are proposing an application of Whirlpool
Hash Function and Physical Unclonable Function (PUF) for an end-to-end authentication
method for NB-IoT devices over 5G network.