2017 European Conference on Networks and Communications (EuCNC) 2017
DOI: 10.1109/eucnc.2017.7980675
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of deployment challenges of Host Identity Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Although the encryption provides for anonymity to the user, the high communication burden and computation difficulty as a result of moving encrypted IMSI from one MME to another in authentication and delivery process is still significant. This may add new components and overhead in expressions of both bandwidth and execution time [68, 69, 70].…”
Section: The Proposed Solutions For Privacy In 5g Network and Discussionmentioning
confidence: 99%
“…Although the encryption provides for anonymity to the user, the high communication burden and computation difficulty as a result of moving encrypted IMSI from one MME to another in authentication and delivery process is still significant. This may add new components and overhead in expressions of both bandwidth and execution time [68, 69, 70].…”
Section: The Proposed Solutions For Privacy In 5g Network and Discussionmentioning
confidence: 99%
“…To address the security challenges, modern security methods can be used, such as securing the physical layer by via Radio-Frequency (RF) [42], or using one of the encryption protocols as HIP [43] also use asymmetric security method [44].…”
Section: Security Solutions For Communication Channelsmentioning
confidence: 99%
“…Thus a higher level of security for critical communication is achievable by utilizing new security mechanisms such as physical layer security adopting Radio-Frequency (RF) fingerprinting [58], using asymmetric security schemes [59] and dynamically changing security parameters according to the situation [21]. Similarly, end-to-end user communication can be secured by using cryptographic protocols like HIP as presented in [60].…”
Section: Security Solutions For Communication Channelsmentioning
confidence: 99%