A Secure Group-Based AKA Protocol for Machine-Type Communications View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2017

AUTHORS

Rosario Giustolisi , Christian Gehrmann , Markus Ahlström , Simon Holmberg

ABSTRACT

The fifth generation wireless system (5G) is expected to handle with an unpredictable number of heterogeneous connected devices while guaranteeing a high level of security. This paper advances a group-based Authentication and Key Agreement (AKA) protocol that contributes to reduce latency and bandwidth consumption, and scales up to a very large number of devices. A central feature of the proposed protocol is that it provides a way to dynamically customize the trade-off between security and efficiency. The protocol is lightweight as it resorts on symmetric key encryption only, hence it supports low-end devices and can be already adopted in current standards with little effort. Using ProVerif, we prove that the protocol meets mutual authentication, key confidentiality, and device privacy also in presence of corrupted devices, a threat model not being addressed in the state-of-the-art group-based AKA proposals. We evaluate the protocol performances in terms of latency and bandwidth consumption, and obtain promising results. More... »

PAGES

3-27

Book

TITLE

Information Security and Cryptology – ICISC 2016

ISBN

978-3-319-53176-2
978-3-319-53177-9

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-53177-9_1

DOI

http://dx.doi.org/10.1007/978-3-319-53177-9_1

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1083762849


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Swedish Institute of Computer Science", 
          "id": "https://www.grid.ac/institutes/grid.6383.e", 
          "name": [
            "Swedish Institute of Computer Science Stockholm Sweden"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Giustolisi", 
        "givenName": "Rosario", 
        "id": "sg:person.01307665235.36", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01307665235.36"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Swedish Institute of Computer Science", 
          "id": "https://www.grid.ac/institutes/grid.6383.e", 
          "name": [
            "Swedish Institute of Computer Science Stockholm Sweden"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gehrmann", 
        "givenName": "Christian", 
        "id": "sg:person.07667010217.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07667010217.52"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Swedish Institute of Computer Science", 
          "id": "https://www.grid.ac/institutes/grid.6383.e", 
          "name": [
            "Swedish Institute of Computer Science Stockholm Sweden"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ahlstr\u00f6m", 
        "givenName": "Markus", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Swedish Institute of Computer Science", 
          "id": "https://www.grid.ac/institutes/grid.6383.e", 
          "name": [
            "Swedish Institute of Computer Science Stockholm Sweden"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Holmberg", 
        "givenName": "Simon", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/2810103.2813615", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1004382000"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.future.2015.09.028", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1008314250"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.ins.2015.01.037", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1015692398"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/sec.1252", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1022005822"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/bltj.21566", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1040585488"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s11276-014-0788-9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042708708", 
          "https://doi.org/10.1007/s11276-014-0788-9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.comnet.2012.07.019", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047681102"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.ins.2012.07.065", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1048394012"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-39555-5_2", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1048884835", 
          "https://doi.org/10.1007/978-3-319-39555-5_2"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-29078-2_3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1050842693", 
          "https://doi.org/10.1007/978-3-319-29078-2_3"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/360204.360213", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1053363478"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tit.1983.1056650", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061648830"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/hpcc.and.euc.2013.226", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094152674"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/risp.1993.287633", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094327835"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/csfw.2001.930138", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094999511"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/csfw.2001.930138", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094999511"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/jcn.2016.000028", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095150963"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.5220/0005996203600367", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1099446975"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2017", 
    "datePublishedReg": "2017-01-01", 
    "description": "The fifth generation wireless system (5G) is expected to handle with an unpredictable number of heterogeneous connected devices while guaranteeing a high level of security. This paper advances a group-based Authentication and Key Agreement (AKA) protocol that contributes to reduce latency and bandwidth consumption, and scales up to a very large number of devices. A central feature of the proposed protocol is that it provides a way to dynamically customize the trade-off between security and efficiency. The protocol is lightweight as it resorts on symmetric key encryption only, hence it supports low-end devices and can be already adopted in current standards with little effort. Using ProVerif, we prove that the protocol meets mutual authentication, key confidentiality, and device privacy also in presence of corrupted devices, a threat model not being addressed in the state-of-the-art group-based AKA proposals. We evaluate the protocol performances in terms of latency and bandwidth consumption, and obtain promising results.", 
    "editor": [
      {
        "familyName": "Hong", 
        "givenName": "Seokhie", 
        "type": "Person"
      }, 
      {
        "familyName": "Park", 
        "givenName": "Jong Hwan", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-53177-9_1", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-319-53176-2", 
        "978-3-319-53177-9"
      ], 
      "name": "Information Security and Cryptology \u2013 ICISC 2016", 
      "type": "Book"
    }, 
    "name": "A Secure Group-Based AKA Protocol for Machine-Type Communications", 
    "pagination": "3-27", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-53177-9_1"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "e624de30404853279a1e00f7eb1093ef9c75f4865edf4b3be63fa13316443239"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1083762849"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-53177-9_1", 
      "https://app.dimensions.ai/details/publication/pub.1083762849"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T21:11", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8690_00000331.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-53177-9_1"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-53177-9_1'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-53177-9_1'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-53177-9_1'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-53177-9_1'


 

This table displays all metadata directly associated to this object as RDF triples.

143 TRIPLES      23 PREDICATES      44 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-53177-9_1 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N389b9e564c3f4607bfe91a83f0d48bfb
4 schema:citation sg:pub.10.1007/978-3-319-29078-2_3
5 sg:pub.10.1007/978-3-319-39555-5_2
6 sg:pub.10.1007/s11276-014-0788-9
7 https://doi.org/10.1002/bltj.21566
8 https://doi.org/10.1002/sec.1252
9 https://doi.org/10.1016/j.comnet.2012.07.019
10 https://doi.org/10.1016/j.future.2015.09.028
11 https://doi.org/10.1016/j.ins.2012.07.065
12 https://doi.org/10.1016/j.ins.2015.01.037
13 https://doi.org/10.1109/csfw.2001.930138
14 https://doi.org/10.1109/hpcc.and.euc.2013.226
15 https://doi.org/10.1109/jcn.2016.000028
16 https://doi.org/10.1109/risp.1993.287633
17 https://doi.org/10.1109/tit.1983.1056650
18 https://doi.org/10.1145/2810103.2813615
19 https://doi.org/10.1145/360204.360213
20 https://doi.org/10.5220/0005996203600367
21 schema:datePublished 2017
22 schema:datePublishedReg 2017-01-01
23 schema:description The fifth generation wireless system (5G) is expected to handle with an unpredictable number of heterogeneous connected devices while guaranteeing a high level of security. This paper advances a group-based Authentication and Key Agreement (AKA) protocol that contributes to reduce latency and bandwidth consumption, and scales up to a very large number of devices. A central feature of the proposed protocol is that it provides a way to dynamically customize the trade-off between security and efficiency. The protocol is lightweight as it resorts on symmetric key encryption only, hence it supports low-end devices and can be already adopted in current standards with little effort. Using ProVerif, we prove that the protocol meets mutual authentication, key confidentiality, and device privacy also in presence of corrupted devices, a threat model not being addressed in the state-of-the-art group-based AKA proposals. We evaluate the protocol performances in terms of latency and bandwidth consumption, and obtain promising results.
24 schema:editor N4334e2f60f69414e9b558bcba1b6a1d6
25 schema:genre chapter
26 schema:inLanguage en
27 schema:isAccessibleForFree true
28 schema:isPartOf N66826f79667c45ac9c2911402573bb45
29 schema:name A Secure Group-Based AKA Protocol for Machine-Type Communications
30 schema:pagination 3-27
31 schema:productId N120903786eeb4546ac760284613ce2a3
32 Nb52ab9ff48a546b89ff753a41c43af8b
33 Ne6375514c0844af09da09242a1f10654
34 schema:publisher N10a9efd37caa48999df3d3b812ce1376
35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1083762849
36 https://doi.org/10.1007/978-3-319-53177-9_1
37 schema:sdDatePublished 2019-04-15T21:11
38 schema:sdLicense https://scigraph.springernature.com/explorer/license/
39 schema:sdPublisher N0b79c93dcd8b4b44873a40a3e6d4efe5
40 schema:url http://link.springer.com/10.1007/978-3-319-53177-9_1
41 sgo:license sg:explorer/license/
42 sgo:sdDataset chapters
43 rdf:type schema:Chapter
44 N0b79c93dcd8b4b44873a40a3e6d4efe5 schema:name Springer Nature - SN SciGraph project
45 rdf:type schema:Organization
46 N10a9efd37caa48999df3d3b812ce1376 schema:location Cham
47 schema:name Springer International Publishing
48 rdf:type schema:Organisation
49 N120903786eeb4546ac760284613ce2a3 schema:name dimensions_id
50 schema:value pub.1083762849
51 rdf:type schema:PropertyValue
52 N156fbb406cd44df687214f569d1b4f5e rdf:first N26be7014d5c64f50bf2de10fccf77b1c
53 rdf:rest rdf:nil
54 N26be7014d5c64f50bf2de10fccf77b1c schema:affiliation https://www.grid.ac/institutes/grid.6383.e
55 schema:familyName Holmberg
56 schema:givenName Simon
57 rdf:type schema:Person
58 N348bcadae62045d3a76b0e43a2a7f9d7 schema:familyName Park
59 schema:givenName Jong Hwan
60 rdf:type schema:Person
61 N37dde6bb079d4d3b80cfc2e5a18c57b8 schema:affiliation https://www.grid.ac/institutes/grid.6383.e
62 schema:familyName Ahlström
63 schema:givenName Markus
64 rdf:type schema:Person
65 N389b9e564c3f4607bfe91a83f0d48bfb rdf:first sg:person.01307665235.36
66 rdf:rest Nd446001461004c6bbdd3949aeed34431
67 N4334e2f60f69414e9b558bcba1b6a1d6 rdf:first Nf9df00269ae24439a5b72e315a47ee38
68 rdf:rest Nb61e2338539b4ff2886797a85304cc2a
69 N66826f79667c45ac9c2911402573bb45 schema:isbn 978-3-319-53176-2
70 978-3-319-53177-9
71 schema:name Information Security and Cryptology – ICISC 2016
72 rdf:type schema:Book
73 Na489ef77517641a8bf4a2f7b8406b542 rdf:first N37dde6bb079d4d3b80cfc2e5a18c57b8
74 rdf:rest N156fbb406cd44df687214f569d1b4f5e
75 Nb52ab9ff48a546b89ff753a41c43af8b schema:name doi
76 schema:value 10.1007/978-3-319-53177-9_1
77 rdf:type schema:PropertyValue
78 Nb61e2338539b4ff2886797a85304cc2a rdf:first N348bcadae62045d3a76b0e43a2a7f9d7
79 rdf:rest rdf:nil
80 Nd446001461004c6bbdd3949aeed34431 rdf:first sg:person.07667010217.52
81 rdf:rest Na489ef77517641a8bf4a2f7b8406b542
82 Ne6375514c0844af09da09242a1f10654 schema:name readcube_id
83 schema:value e624de30404853279a1e00f7eb1093ef9c75f4865edf4b3be63fa13316443239
84 rdf:type schema:PropertyValue
85 Nf9df00269ae24439a5b72e315a47ee38 schema:familyName Hong
86 schema:givenName Seokhie
87 rdf:type schema:Person
88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
89 schema:name Information and Computing Sciences
90 rdf:type schema:DefinedTerm
91 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
92 schema:name Data Format
93 rdf:type schema:DefinedTerm
94 sg:person.01307665235.36 schema:affiliation https://www.grid.ac/institutes/grid.6383.e
95 schema:familyName Giustolisi
96 schema:givenName Rosario
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01307665235.36
98 rdf:type schema:Person
99 sg:person.07667010217.52 schema:affiliation https://www.grid.ac/institutes/grid.6383.e
100 schema:familyName Gehrmann
101 schema:givenName Christian
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07667010217.52
103 rdf:type schema:Person
104 sg:pub.10.1007/978-3-319-29078-2_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050842693
105 https://doi.org/10.1007/978-3-319-29078-2_3
106 rdf:type schema:CreativeWork
107 sg:pub.10.1007/978-3-319-39555-5_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048884835
108 https://doi.org/10.1007/978-3-319-39555-5_2
109 rdf:type schema:CreativeWork
110 sg:pub.10.1007/s11276-014-0788-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042708708
111 https://doi.org/10.1007/s11276-014-0788-9
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1002/bltj.21566 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040585488
114 rdf:type schema:CreativeWork
115 https://doi.org/10.1002/sec.1252 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022005822
116 rdf:type schema:CreativeWork
117 https://doi.org/10.1016/j.comnet.2012.07.019 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047681102
118 rdf:type schema:CreativeWork
119 https://doi.org/10.1016/j.future.2015.09.028 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008314250
120 rdf:type schema:CreativeWork
121 https://doi.org/10.1016/j.ins.2012.07.065 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048394012
122 rdf:type schema:CreativeWork
123 https://doi.org/10.1016/j.ins.2015.01.037 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015692398
124 rdf:type schema:CreativeWork
125 https://doi.org/10.1109/csfw.2001.930138 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094999511
126 rdf:type schema:CreativeWork
127 https://doi.org/10.1109/hpcc.and.euc.2013.226 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094152674
128 rdf:type schema:CreativeWork
129 https://doi.org/10.1109/jcn.2016.000028 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095150963
130 rdf:type schema:CreativeWork
131 https://doi.org/10.1109/risp.1993.287633 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094327835
132 rdf:type schema:CreativeWork
133 https://doi.org/10.1109/tit.1983.1056650 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061648830
134 rdf:type schema:CreativeWork
135 https://doi.org/10.1145/2810103.2813615 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004382000
136 rdf:type schema:CreativeWork
137 https://doi.org/10.1145/360204.360213 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053363478
138 rdf:type schema:CreativeWork
139 https://doi.org/10.5220/0005996203600367 schema:sameAs https://app.dimensions.ai/details/publication/pub.1099446975
140 rdf:type schema:CreativeWork
141 https://www.grid.ac/institutes/grid.6383.e schema:alternateName Swedish Institute of Computer Science
142 schema:name Swedish Institute of Computer Science Stockholm Sweden
143 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...