Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

A secure group-based AKA protocol for machine-type communications

Giustolisi, Rosario ; Gehrmann, Christian LU ; Ahlström, Markus and Holmberg, Simon (2017) 19th International Conference on Information Security and Cryptology, ICISC 2016 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10157 LNCS. p.3-27
Abstract

The fifth generation wireless system (5G) is expected to handle with an unpredictable number of heterogeneous connected devices while guaranteeing a high level of security. This paper advances a groupbased Authentication and Key Agreement (AKA) protocol that contributes to reduce latency and bandwidth consumption, and scales up to a very large number of devices. A central feature of the proposed protocol is that it provides a way to dynamically customize the trade-off between security and efficiency. The protocol is lightweight as it resorts on symmetric key encryption only, hence it supports low-end devices and can be already adopted in current standards with little effort. Using ProVerif, we prove that the protocol meets mutual... (More)

The fifth generation wireless system (5G) is expected to handle with an unpredictable number of heterogeneous connected devices while guaranteeing a high level of security. This paper advances a groupbased Authentication and Key Agreement (AKA) protocol that contributes to reduce latency and bandwidth consumption, and scales up to a very large number of devices. A central feature of the proposed protocol is that it provides a way to dynamically customize the trade-off between security and efficiency. The protocol is lightweight as it resorts on symmetric key encryption only, hence it supports low-end devices and can be already adopted in current standards with little effort. Using ProVerif, we prove that the protocol meets mutual authentication, key confidentiality, and device privacy also in presence of corrupted devices, a threat model not being addressed in the state-of-the-art group-based AKA proposals. We evaluate the protocol performances in terms of latency and bandwidth consumption, and obtain promising results.

(Less)
Please use this url to cite or link to this publication:
author
; ; and
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
host publication
Information Security and Cryptology – ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers - 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers
series title
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
editor
Hong, Seokhie and Park, Jong Hwan
volume
10157 LNCS
pages
25 pages
publisher
Springer
conference name
19th International Conference on Information Security and Cryptology, ICISC 2016
conference location
Seoul, Korea, Republic of
conference dates
2016-11-30 - 2016-12-02
external identifiers
  • scopus:85012965501
ISSN
1611-3349
0302-9743
ISBN
978-3-319-53177-9
978-3-319-53176-2
DOI
10.1007/978-3-319-53177-9_1
language
English
LU publication?
no
id
0da06bdf-3589-4465-b042-6f4380613956
date added to LUP
2018-11-21 16:15:59
date last changed
2024-03-02 12:33:45
@inbook{0da06bdf-3589-4465-b042-6f4380613956,
  abstract     = {{<p>The fifth generation wireless system (5G) is expected to handle with an unpredictable number of heterogeneous connected devices while guaranteeing a high level of security. This paper advances a groupbased Authentication and Key Agreement (AKA) protocol that contributes to reduce latency and bandwidth consumption, and scales up to a very large number of devices. A central feature of the proposed protocol is that it provides a way to dynamically customize the trade-off between security and efficiency. The protocol is lightweight as it resorts on symmetric key encryption only, hence it supports low-end devices and can be already adopted in current standards with little effort. Using ProVerif, we prove that the protocol meets mutual authentication, key confidentiality, and device privacy also in presence of corrupted devices, a threat model not being addressed in the state-of-the-art group-based AKA proposals. We evaluate the protocol performances in terms of latency and bandwidth consumption, and obtain promising results.</p>}},
  author       = {{Giustolisi, Rosario and Gehrmann, Christian and Ahlström, Markus and Holmberg, Simon}},
  booktitle    = {{Information Security and Cryptology – ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers}},
  editor       = {{Hong, Seokhie and Park, Jong Hwan}},
  isbn         = {{978-3-319-53177-9}},
  issn         = {{1611-3349}},
  language     = {{eng}},
  month        = {{11}},
  pages        = {{3--27}},
  publisher    = {{Springer}},
  series       = {{Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}},
  title        = {{A secure group-based AKA protocol for machine-type communications}},
  url          = {{http://dx.doi.org/10.1007/978-3-319-53177-9_1}},
  doi          = {{10.1007/978-3-319-53177-9_1}},
  volume       = {{10157 LNCS}},
  year         = {{2017}},
}