2021
DOI: 10.1109/mcomstd.001.2000024
|View full text |Cite
|
Sign up to set email alerts
|

5G Authentication and Key Management for Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…The matrix R 𝑘 ∈ C 𝑁 ×𝑁 is the covariance matrix of the spatially correlated signals collected by the RAs of the satellite attenuated by the propagation loss. 1 The LoS component is given by…”
Section: A Channel Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The matrix R 𝑘 ∈ C 𝑁 ×𝑁 is the covariance matrix of the spatially correlated signals collected by the RAs of the satellite attenuated by the propagation loss. 1 The LoS component is given by…”
Section: A Channel Modelmentioning
confidence: 99%
“…The spectral vs energy efficiency trade-off of terrestrial communication systems has been remarkably improved in the recent decades, especially by the fifth-generation (5G) system [1], [2]. However, further escalation of the tele-traffic is anticipated with billions of devices managed by the terrestrial wireless networks.…”
Section: Introductionmentioning
confidence: 99%
“…It requires authentication of the user terminal at the application layer. The authentication can be based on credentials such as a token, certificate, or user ID/password between the user terminal and the application [3]. 3GPP proposed the authentication and key management for application (AKMA) scheme through TS 33.535 [4] and TS 38.535 [17].…”
Section: Akma Architecturementioning
confidence: 99%
“…In general, authentication between service users and application service servers is based on credentials such as tokens, certificates, username/password, etc. [3]. In order to protect the communication between the user terminal and the application, it is reasonable to use a credential using a session key known only to the communication party.…”
Section: Introductionmentioning
confidence: 99%
“…Khan et al analyzed the security and privacy issues during the AKMA key update process in the AKMA: Delegated Authentication System of 5G [2] . Huang et al proposed the limitations of GBA and AKMA but did not provide a solution [3] .…”
Section: Introductionmentioning
confidence: 99%