Public Key Cryptography without Certificates for beyond 5G Mobile Small Cells

Marcus De Ree, Georgios Mantas, James Gao, Jonathan Rodriguez, Ifiok E. Otung

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The 5G network takes advantage of the small cells technology. The next logical step is to cover the urban landscape with mobile small cells, to optimize network services. However, the introduction of mobile small cells raises various security challenges. Cryptographic solutions are capable of solving these as long as they are supported by appropriate key management schemes. The threshold-tolerant identity-based cryptosystem, forms a solid basis for key management schemes for mobile small cells. However, this approach is unable to sustain security over time. Therefore, we introduce two extensions, proactive secret sharing and private key cloaking, to address this challenge.

Original languageEnglish
Title of host publication2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2020
PublisherInstitute of Electrical and Electronics Engineers
ISBN (Electronic)978-1-7281-6743-5, 978-1-7281-6051-1
DOIs
Publication statusPublished - 10 Nov 2020
Event12th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2020 - Porto, Portugal
Duration: 20 Jul 202022 Jul 2020

Publication series

Name2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2020

Conference

Conference12th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2020
Country/TerritoryPortugal
CityPorto
Period20/07/2022/07/20

Keywords

  • Ad Hoc Network
  • Beyond 5G
  • Cryptography
  • D2D Communication
  • Decentralized Systems
  • Key Management
  • Mobile Small Cell
  • Security

Fingerprint

Dive into the research topics of 'Public Key Cryptography without Certificates for beyond 5G Mobile Small Cells'. Together they form a unique fingerprint.

Cite this