To Trust or Not to Trust: Data Origin Authentication for Group Communication in 5G Networks

作者: Robert Annessi , Joachim Fabini , Tanja Zseby

DOI: 10.1145/3230833.3233252

关键词:

摘要: With the expected massive increase in high-bandwidth applications over 5G cellular networks, efficient use of radio-network and core-network infrastructures becomes essential. Group communication is a method for transmitting data efficiently from one source to many receivers. In this paper we study security provided terms authenticity integrity group networks. We identify that current solutions involve trusting benignity operational network operators as well its users since do not provide origin authentication. Based on insight, present two attack scenarios which an adversary exploits level such arbitrary can be injected maliciously while receivers consider if they were sent by claimed source. evaluate potential approaches authentication show future research required general solution.

参考文章(15)
Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski, MQQ-SIG Trusted Systems. ,vol. 7222, pp. 184- 203 ,(2012) , 10.1007/978-3-642-32298-3_13
M. Baugher, B. Weis, T. Hardjono, H. Harney, The Group Domain of Interpretation The Group Domain of Interpretation. ,vol. 3547, pp. 1- 48 ,(2003)
Shimon Even, Oded Goldreich, Silvio Micali, On-line/off-line digital signatures Journal of Cryptology. ,vol. 9, pp. 35- 67 ,(1996) , 10.1007/BF02254791
Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang, High-speed high-security signatures Journal of Cryptographic Engineering. ,vol. 2, pp. 77- 89 ,(2012) , 10.1007/S13389-012-0027-1
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, Multicast security: a taxonomy and some efficient constructions international conference on computer communications. ,vol. 2, pp. 708- 716 ,(1999) , 10.1109/INFCOM.1999.751457
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah, A taxonomy of multicast data origin authentication: Issues and solutions IEEE Communications Surveys and Tutorials. ,vol. 6, pp. 34- 57 ,(2004) , 10.1109/COMST.2004.5342292
Yacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard, RLH: receiver driven layered hash-chaining for multicast data origin authentication Computer Communications. ,vol. 28, pp. 726- 740 ,(2005) , 10.1016/J.COMCOM.2004.10.009
Christophe Tartary, Huaxiong Wang, San Ling, Authentication of Digital Streams IEEE Transactions on Information Theory. ,vol. 57, pp. 6285- 6303 ,(2011) , 10.1109/TIT.2011.2161960
Q. Wang, H. Khurana, Y. Huang, K. Nahrstedt, Time Valid One-Time Signature for Time-Critical Multicast Data Authentication international conference on computer communications. pp. 1233- 1241 ,(2009) , 10.1109/INFCOM.2009.5062037
R. Canetti, B. Briscoe, D. Song, A. Perrig, J. D. Tygar, Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction RFC. ,vol. 4082, pp. 1- 22 ,(2005)