2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) 2017
DOI: 10.1109/iwcmc.2017.7986606
|View full text |Cite
|
Sign up to set email alerts
|

Access control in 5G communication networks using simple PKI certificates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…Attacks of movement tracking: An attacker can collect a huge number of packets in a specific region based on user's actual locations and route schedule by analysing the captured packets; an attacker can collect a huge number of packets in a specific region and try to track users [39]. Attacks of identity revealing: To guess the identities, routine schedule, and actual location of a specific group of users, an adversary may collect user's private data or traffic schedule packets [40]. Attacks of collusion: To capture more data about specific users than what it can obtain by itself, such as retrieving secured data and information or identifiers of specific users, attackers can cooperate with other attackers [41].…”
Section: Types Of Privacy Attacks In 5gmentioning
confidence: 99%
See 1 more Smart Citation
“…Attacks of movement tracking: An attacker can collect a huge number of packets in a specific region based on user's actual locations and route schedule by analysing the captured packets; an attacker can collect a huge number of packets in a specific region and try to track users [39]. Attacks of identity revealing: To guess the identities, routine schedule, and actual location of a specific group of users, an adversary may collect user's private data or traffic schedule packets [40]. Attacks of collusion: To capture more data about specific users than what it can obtain by itself, such as retrieving secured data and information or identifiers of specific users, attackers can cooperate with other attackers [41].…”
Section: Types Of Privacy Attacks In 5gmentioning
confidence: 99%
“…Attacks of identity revealing: To guess the identities, routine schedule, and actual location of a specific group of users, an adversary may collect user's private data or traffic schedule packets [40].…”
Section: Types Of Privacy Attacks In 5gmentioning
confidence: 99%
“…Cryptography operations with high computational and energy consumption have been used in the research. In [30], the researchers have used the PKI certificate to authenticate. This will need a data center Certificate Authority (CA), which is different from 3GPP architecture.…”
Section: Discussionmentioning
confidence: 99%
“…W. Boubakri et al [30] proposed an access control scheme using PKI for 5G networks, which can be used on a multi-layer communication architecture. In addition, the author has designed scalable authentication and handover schemes, which can guarantee security within the network.…”
Section: D2d Handovermentioning
confidence: 99%
“…al. [87] proposed a PKI and Zero Knowledge Proof (ZKP) based access control and authentication scheme specifically designed for 5G networks. In the proposal, hierarchical PKI architecture is built to delegate the issuance of certificates from root certification authority (Root CA) to terminal D2D devices.…”
Section: In-coverage Relay-coverage and Out-of-coverage Compatible Sc...mentioning
confidence: 99%