2021
DOI: 10.1016/j.comcom.2021.06.012
|View full text |Cite
|
Sign up to set email alerts
|

DISTANT: DIStributed Trusted Authority-based key managemeNT for beyond 5G wireless mobile small cells

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(17 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…Their key management scheme incorporated the extensions of verifiable secret sharing (VSS) [13] and proactive secret sharing (PSS) [14], [15] to prevent malicious adversaries from disabling or compromising the system (see Section III-B). More novel schemes, proposed by Deng et al [16] and da Silva et al [17] were based on traditional identity-based public key cryptography (ID-PKC) and the schemes by Zhang et al [18], Li et al [19], Lai et al [20], Gharib et al [21] and de Ree et al [22] were based on certificateless public key cryptography (CL-PKC). Therefore, the FD-TTP took the role of a private key generator (PKG) and a key generation center (KGC), respectively, to provide network nodes with their (partial) private key.…”
Section: A Conventional Fd-ttp-based Key Managementmentioning
confidence: 99%
See 2 more Smart Citations
“…Their key management scheme incorporated the extensions of verifiable secret sharing (VSS) [13] and proactive secret sharing (PSS) [14], [15] to prevent malicious adversaries from disabling or compromising the system (see Section III-B). More novel schemes, proposed by Deng et al [16] and da Silva et al [17] were based on traditional identity-based public key cryptography (ID-PKC) and the schemes by Zhang et al [18], Li et al [19], Lai et al [20], Gharib et al [21] and de Ree et al [22] were based on certificateless public key cryptography (CL-PKC). Therefore, the FD-TTP took the role of a private key generator (PKG) and a key generation center (KGC), respectively, to provide network nodes with their (partial) private key.…”
Section: A Conventional Fd-ttp-based Key Managementmentioning
confidence: 99%
“…• Disruptive Adversary: A disruptive adversary [22] is a malicious server that provides a false key management service. This false key management service can be the provisioning of a false subshare during (i) the admission of new nodes or (ii) the updating of every node's share.…”
Section: B Adversarial Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed approach should be scalable and support a highly dense mobile environment spread across a large geographical area and be suitable for the small cell scenario in 5G and beyond networks [24,25,26,27]. Towards this end, we are looking at different decentralized integrity schemes to distribute the secret keys used for HMAC-based integrity schemes to the participating nodes.…”
Section: Key Management Schemes For Nc-enabled Small Cellsmentioning
confidence: 99%
“…Considering the above aspects, this paper proposes a distributed key management protocol for secure NC-enabled environments. The idea of using decentralized key management schemes to suit the requirements of mobile networks in the 5G and beyond era has got significant research attractions in the recent years [24,25,26,27]. The proposed key distribution protocol employs the distributed ledger hosted by the BSH controllers to efficiently distribute the keys in the dynamic environment.…”
Section: Key Management Schemes For Nc-enabled Small Cellsmentioning
confidence: 99%