2021 IEEE Global Communications Conference (GLOBECOM) 2021
DOI: 10.1109/globecom46510.2021.9685173
|View full text |Cite
|
Sign up to set email alerts
|

On Evaluating Delegated Digital Signing of Broadcasting Messages in 5G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Few studies (such as [12,13]) proposed various mechanisms to counteract the FBS. However, in this paper, we focus on those proposed by 3GPP: PKC-, IBC-, and group key-based schemes [7].…”
Section: Existing Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Few studies (such as [12,13]) proposed various mechanisms to counteract the FBS. However, in this paper, we focus on those proposed by 3GPP: PKC-, IBC-, and group key-based schemes [7].…”
Section: Existing Countermeasuresmentioning
confidence: 99%
“…This section presents the performance and security comparison results of the proposed protocol against the PKC-, IBC-, group key-based, and DSnF schemes [12]. Tab.…”
Section: Comparative Analysismentioning
confidence: 99%
“…Solutions in using 5G and other networks (e.g., Wi-Fi). Bhuyan et al, 2021;Ksentini and Frangoudis, 2020;Gonzalez et al, 2020;Liyanage et al, 2018;Wang and Yan, 2015;Tahir et al, 2020;Azzaoui et al, 2020;Nieto et al, 2017Nieto et al, , 2018Zhang and Lin, 2017;Compagno et al, 2017;Dik and Berger, 2021;Benzaid and Taleb, 2020;Zhao et al, 2021a;Bitsikas and Pöpper, 2021;Chaudhary et al, 2020;Gao et al, 2021;Sood et al, 2021;Cao et al, 2020;Ding et al, 2022b;Wu et al, 2018;Shi and Sagduyu, 2021;Sullivan et al, 2021;Mei et al, 2018;Gebremariam et al, 2021;Ginzboorg and Niemi, 2016;Rotinsulu and Fitri Sari, 2018;Vassilakis et al, 2017;Ar-joune and Faruque, 2020]. An adversary can maliciously (1) use legitimate orchestrator access to manipulate the configuration and run a compromised network function, (2) take advantage of malicious insiders attacks, (3) perform unauthorized access (e.g., to confidential data [Isaksson and Norrman, 2020] and to RFID tags [Rahimi et al, 2018]), (4) tampering, (5) perform resource exhaustion, (6) turn services unavailable, ( 7) analyze or modify traffic, (8) perform data leakage (e.g., capturing valuable personal information [Bordel et al, 2021;Annessi et al, 2018;Vreman and Maggio, 2019]), (…”
Section: Item Description Item Descriptionmentioning
confidence: 99%