Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A secure group-based AKA protocol for machine-type communications
RISE - Research Institutes of Sweden, ICT, SICS.
RISE, Swedish ICT, SICS, Security Lab.ORCID iD: 0000-0001-8003-200X
RISE - Research Institutes of Sweden, ICT, SICS.
RISE - Research Institutes of Sweden, ICT, SICS.
2017 (English)In: Lect. Notes Comput. Sci., 2017, p. 3-27, article id 10157Conference paper, Published paper (Refereed)
Abstract [en]

The fifth generation wireless system (5G) is expected to handle with an unpredictable number of heterogeneous connected devices while guaranteeing a high level of security. This paper advances a groupbased Authentication and Key Agreement (AKA) protocol that contributes to reduce latency and bandwidth consumption, and scales up to a very large number of devices. A central feature of the proposed protocol is that it provides a way to dynamically customize the trade-off between security and efficiency. The protocol is lightweight as it resorts on symmetric key encryption only, hence it supports low-end devices and can be already adopted in current standards with little effort. Using ProVerif, we prove that the protocol meets mutual authentication, key confidentiality, and device privacy also in presence of corrupted devices, a threat model not being addressed in the state-of-the-art group-based AKA proposals. We evaluate the protocol performances in terms of latency and bandwidth consumption, and obtain promising results.

Place, publisher, year, edition, pages
2017. p. 3-27, article id 10157
Keywords [en]
Authentication, Bandwidth, Cryptography, Economic and social effects, Security of data, Authentication and key agreements, Bandwidth consumption, Machine type communications, Mutual authentication, Protocol performance, State of the art, Symmetric key encryption, Wireless systems, Network security
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:ri:diva-29381DOI: 10.1007/978-3-319-53177-9_1Scopus ID: 2-s2.0-85012965501ISBN: 9783319531762 (print)OAI: oai:DiVA.org:ri-29381DiVA, id: diva2:1094980
Conference
International Conference on Information Security and Cryptology ICISC 2016: Information Security and Cryptology – ICISC 2016. 30 November 2016 through 2 December 2016
Available from: 2017-05-11 Created: 2017-05-11 Last updated: 2018-01-13Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Gehrmann, Christian
By organisation
SICSSecurity Lab
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 8 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
v. 2.34.0