Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
A secure group-based AKA protocol for machine-type communications
RISE - Research Institutes of Sweden, ICT, SICS.
RISE., Swedish ICT, SICS, Security Lab.ORCID-id: 0000-0001-8003-200x
RISE - Research Institutes of Sweden, ICT, SICS.
RISE - Research Institutes of Sweden, ICT, SICS.
2016 (Engelska)Ingår i: Information Security and Cryptology – ICISC 2016 / [ed] Seokhie Hong, Jong Hwan Park, 2016, s. 3-27, artikel-id 10157Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

The fifth generation wireless system (5G) is expected to handle with an unpredictable number of heterogeneous connected devices while guaranteeing a high level of security. This paper advances a groupbased Authentication and Key Agreement (AKA) protocol that contributes to reduce latency and bandwidth consumption, and scales up to a very large number of devices. A central feature of the proposed protocol is that it provides a way to dynamically customize the trade-off between security and efficiency. The protocol is lightweight as it resorts on symmetric key encryption only, hence it supports low-end devices and can be already adopted in current standards with little effort. Using ProVerif, we prove that the protocol meets mutual authentication, key confidentiality, and device privacy also in presence of corrupted devices, a threat model not being addressed in the state-of-the-art group-based AKA proposals. We evaluate the protocol performances in terms of latency and bandwidth consumption, and obtain promising results.

Ort, förlag, år, upplaga, sidor
2016. s. 3-27, artikel-id 10157
Serie
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743 ; 10157
Nyckelord [en]
Authentication, Bandwidth, Cryptography, Economic and social effects, Security of data, Authentication and key agreements, Bandwidth consumption, Machine type communications, Mutual authentication, Protocol performance, State of the art, Symmetric key encryption, Wireless systems, Network security
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
URN: urn:nbn:se:ri:diva-29381DOI: 10.1007/978-3-319-53177-9_1Scopus ID: 2-s2.0-85012965501ISBN: 978-3-319-53176-2 (tryckt)ISBN: 978-3-319-53177-9 (digital)OAI: oai:DiVA.org:ri-29381DiVA, id: diva2:1094980
Konferens
19th International Conference on Information Security and Cryptology (ICISC 2016), November 30 - December 2, 2016, Seoul, South Korea
Tillgänglig från: 2017-05-11 Skapad: 2017-05-11 Senast uppdaterad: 2019-07-10Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltextScopushttp

Personposter BETA

Gehrmann, Christian

Sök vidare i DiVA

Av författaren/redaktören
Gehrmann, Christian
Av organisationen
SICSSecurity Lab
Data- och informationsvetenskap

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetricpoäng

doi
isbn
urn-nbn
Totalt: 17 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
v. 2.35.10