Skip navigation

Key management for secure network coding-enabled mobile small cells

Key management for secure network coding-enabled mobile small cells

de Ree, Marcus, Mantas, Georgios, Radwan, Ayman, Rodriguez, Jonathan and Otung, Ifiok (2018) Key management for secure network coding-enabled mobile small cells. In: Broadband Communications, Networks, and Systems. 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering . Springer, pp. 327-336. ISBN 978-3030051945 ISSN 1867-822X (Online) (doi:https://doi.org/10.1007/978-3-030-05195-2_32)

[img]
Preview
PDF (Author Accepted Manuscript)
23912 MANTAS_Key_Management_for_Secure_Network_Coding-Enabled_Mobile_Small_Cells_2018.pdf - Accepted Version

Download (556kB) | Preview

Abstract

The continuous growth in wireless devices connected to the Internet and the increasing demand for higher data rates put ever increasing pressure on the 4G cellular network. The EU funded H2020-MSCA project “SECRET” investigates a scenario architecture to cover the urban landscape for the upcoming 5G cellular network. The studied scenario architecture combines multi-hop device-to-device (D2D) communication with network coding-enabled mobile small cells. In this scenario architecture, mobile nodes benefit from high transmission speeds, low latency and increased energy efficiency, while the cellular network benefits from a reduced workload of its base stations. However, this scenario architecture faces various security and privacy challenges. These challenges can be addressed using cryptographic techniques and protocols, assuming that a key management scheme is able to provide mobile nodes with secret keys in a secure manner. Unfortunately, existing key management schemes are unable to cover all security and privacy challenges of the studied scenario architecture. Certificateless key management schemes seem promising, although many proposed schemes of this category of key management schemes require a secure channel or lack key update and key revocation procedures. We therefore suggest further research in key management schemes which include secret key sharing among mobile nodes, key revocation, key update and mobile node authentication to fit with our scenario architecture.

Item Type: Conference Proceedings
Title of Proceedings: Broadband Communications, Networks, and Systems. 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings
Uncontrolled Keywords: 5G, security, privacy, key management, mobile small cells, network coding, D2D communications
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / Department / Research Group: Faculty of Engineering & Science
Faculty of Engineering & Science > Department of Applied Engineering & Management
Last Modified: 02 Jul 2019 12:07
Selected for GREAT 2016: None
Selected for GREAT 2017: None
Selected for GREAT 2018: None
Selected for GREAT 2019: GREAT 5
URI: http://gala.gre.ac.uk/id/eprint/23912

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics