An improved and provably secure symmetric-key based 5G-AKA Protocol.
Awaneesh Kumar YadavManoj MisraPradumn Kumar PandeyAn BraekenMadhusanka LiyanagePublished in: Comput. Networks (2022)
Keyphrases
- provably secure
- key management
- public key cryptography
- diffie hellman
- public key
- standard model
- security model
- signature scheme
- ad hoc networks
- encryption scheme
- key distribution
- resource constrained
- wireless sensor networks
- security analysis
- security requirements
- security protocols
- secure communication
- digital signature
- secret sharing scheme
- group communication
- hash functions
- elliptic curve
- secret key
- security properties
- security services
- lightweight
- database systems