Analytical Study of Authentication and Lightweight Security Techniques in 5G-Enabled IoT Networks

Main Article Content

Vyshali Rao K P, Shanthi M B, Manoj Challa

Abstract

This study presents a comparative analysis of authentication mechanisms and lightweight security solutions within 5G-enabled IoT networks. With the advent of 5G technology, the proliferation of IoT devices necessitates robust yet efficient security protocols to safeguard sensitive data transmissions. We analyzed various authentication methods, including certificate-based, identity-based, and biometric-based authentication, to evaluate their effectiveness in providing secure and scalable solutions. Additionally, lightweight security protocols such as Advanced Encryption Standard (AES), Elliptic Curve Cryptography (ECC), and SHA-3 were assessed for suitability in resource-constrained IoT environments. We also examined post-quantum cryptographic approaches, including lattice-based cryptography and code-based cryptography, to address future quantum threats. The findings reveal that while traditional authentication methods ensure robust security, lightweight security solutions and post-quantum cryptographic approaches are essential for practical deployment in IoT devices with limited computational capabilities. This research highlights the importance of a tailored security approach in 5G IoT networks, balancing the diverse requirements of IoT devices with the critical need for efficient and secure data transmission. Ultimately, the study underscores the significance of selecting appropriate security mechanisms to achieve a harmonious blend of security and efficiency in 5G IoT deployments.

Article Details

Section
Articles