@inbook{0da06bdf35894465b0426f4380613956,
title = "A secure group-based AKA protocol for machine-type communications",
abstract = "The fifth generation wireless system (5G) is expected to handle with an unpredictable number of heterogeneous connected devices while guaranteeing a high level of security. This paper advances a groupbased Authentication and Key Agreement (AKA) protocol that contributes to reduce latency and bandwidth consumption, and scales up to a very large number of devices. A central feature of the proposed protocol is that it provides a way to dynamically customize the trade-off between security and efficiency. The protocol is lightweight as it resorts on symmetric key encryption only, hence it supports low-end devices and can be already adopted in current standards with little effort. Using ProVerif, we prove that the protocol meets mutual authentication, key confidentiality, and device privacy also in presence of corrupted devices, a threat model not being addressed in the state-of-the-art group-based AKA proposals. We evaluate the protocol performances in terms of latency and bandwidth consumption, and obtain promising results.",
author = "Rosario Giustolisi and Christian Gehrmann and Markus Ahlstr{\"o}m and Simon Holmberg",
year = "2017",
month = nov,
day = "30",
doi = "10.1007/978-3-319-53177-9_1",
language = "English",
isbn = "978-3-319-53176-2",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer",
pages = "3--27",
editor = "Seokhie Hong and Park, {Jong Hwan}",
booktitle = "Information Security and Cryptology – ICISC 2016",
address = "Germany",
note = "19th International Conference on Information Security and Cryptology, ICISC 2016 ; Conference date: 30-11-2016 Through 02-12-2016",
}