2018
DOI: 10.1155/2018/8562904
|View full text |Cite
|
Sign up to set email alerts
|

A Security Scheme of 5G Ultradense Network Based on the Implicit Certificate

Abstract: The ultradense network (UDN) is one of the most promising technologies in the fifth generation (5G) to address the network system capacity issue. It can enhance spatial reuse through the flexible, intensive deployment of small base stations. A universal 5G UDN architecture is necessary to realize the autonomous and dynamic deployment of small base stations. However, the security of the 5G UDN is still in its infancy, and the data communication security among the network entities is facing new challenges. In th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…To address these shortcomings, the concept of Signcryption was introduced in [5]. However, this approach is based on PKC in which the public key of a participating entity contains a random number belonging to some group that does not offer authenticity to the participating entity as the group elements provide no identity to the participating entities [6]. To address Signcryption flaws in [5], IBS scheme were suggested in [10].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To address these shortcomings, the concept of Signcryption was introduced in [5]. However, this approach is based on PKC in which the public key of a participating entity contains a random number belonging to some group that does not offer authenticity to the participating entity as the group elements provide no identity to the participating entities [6]. To address Signcryption flaws in [5], IBS scheme were suggested in [10].…”
Section: Related Workmentioning
confidence: 99%
“…However, Zheng approach is based on public key cryptography (PKC). In PKC based schemes, the public key of a participating entity contains a random number belonging to some group that does not offer authenticity to the participating entity as the group elements provide no identity to the participating entities [6]. To address the flaws in PKC based schemes, the notion of public key infrastructure (PKI) was introduced in which a certificate authority (CA) is used that binds the public key with certificates [7].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the algorithm used is based on block chaining technology with Byzantine Fault Tolerance (BFT). The same authors also propose a new security scheme using an implicit certificate based on the analysis of the security challenge of the UDN [95].…”
Section: Security Privacy and Reliability-related Indicatorsmentioning
confidence: 99%
“…For this, the intruder needs the private key pair (Xs, δs) of the CLSR. Therefore, to know about the private keys; an intruder should first compute the Equation 9and (10). For Equation (9) Intruder has to solve the hyper elliptic curve discrete problem which is infeasible, while for (10) intruder needs the random rs from the Equation 11…”
Section: Authenticationmentioning
confidence: 99%