Authentication in a Hyperconnected World: Challenges, Opportunities and Approaches

Authors

  • Christoph Lipps German Research Center for Artificial Intelligence https://orcid.org/0000-0001-6382-9156
  • Jan Herbst German Research Center for Artificial Intelligence
  • Rekha Reddy German Research Center for Artificial Intelligence
  • Matthias Rüb German Research Center for Artificial Intelligence
  • Hans D. Schotten German Research Center for Artificial Intelligence | University of Kaiserslautern (RPTU)

DOI:

https://doi.org/10.34190/iccws.19.1.2070

Abstract

Authentication and integrity are the prerequisites for trustworthy and secure communication. Without unambiguous knowledge of who is being interacted with, no confidential content can be exchanged, no (remote) access to systems and equipment can be granted, and no trust can be established. This situation is further exacerbated by an increasing interconnection and globalization towards a hyperconnected world. (Communication) Participants are no longer necessarily in close physical and social proximity and do not need to know each other, but can have their source/destination anywhere in the world.

       An authentication process is used to verify that someone -whether human or machine-, is in fact who she claims to be: The process thus includes a validation step to evaluate an assertion. However, systems differ in terms of their requirements, for instance with regard to the authentication options available, the time period required for re-authentication and the frequency of re-authentication, as well as the level of security to be achieved with authentication. The latter particularly with regard to the cost/benefit ratio of the application. Additionally, there are efforts to finally abolish traditional passwords, passphrases and pin codes and render them obsolete.

       In this work, technologies and methods for authentication beyond passwords and trustworthy authentication will be examined, particularly with regard to future communication infrastructures such as Beyond 5G and Sixth Generation (6G) wireless systems. Thereby, the impact of Artificial Intelligence (AI) methods, but also the relevance to Quantum Key Distribution (QKD) and Post Quantum Cryptography, as well as the use of 6G-enabling technologies like Reconfigurable Intelligent Surfaces (RISs), Wireless Optical Communication (WOC) and Physical Layer Security (PhySec), for example as additional factors of a multi-factor authentication process, will be considered, along with Body Area Networks (BANs) and the integration of the human body relying on biometrics. The various concepts are compared with regard to their requirements, limitations and possible applications in order to provide the user with an orientation as to which authentication method is conceivable and useful in which specific scenarios.

Author Biography

Christoph Lipps, German Research Center for Artificial Intelligence

Christoph Lipps, graduated in Electrical and Computer Engineering at the University of Kaiserslautern, where he meanwhile lectures as well. He is a Senior Researcher and Ph.D. candidate at the German Research Center for Artificial Intelligence (DFKI) in Kaiserslautern, Germany, heading the Cyber Resilience & Security Team of the Intelligent Networks Research Department. His research focuses on Physical Layer Security (PhySec), Physically Unclonable Functions (PUFs), Artificial Intelligence (AI), Security in the Sixth Generation (6G) Wireless Systems and all aspects of network and cyber security. He is the author of numerous scientific publications, member of the IEEE, ACM and VDE, as well as of the scientific advisory boards of several international conferences and journals.

Downloads

Published

2024-03-21