Alternative Security Options in the 5G and IoT Era
This article attempts to provide a set of new directions and ideas for research in the ever vibrant fields of telecom and IoT security. It attempts by no means to present a complete set of security solutions; this would be by definition impossible. It rather serves as a short but comprehensive intro...
Gespeichert in:
Veröffentlicht in: | IEEE circuits and systems magazine (New York, N.Y. 2001) N.Y. 2001), 2017-01, Vol.17 (4), p.6-28 |
---|---|
1. Verfasser: | |
Format: | Magazinearticle |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 28 |
---|---|
container_issue | 4 |
container_start_page | 6 |
container_title | IEEE circuits and systems magazine (New York, N.Y. 2001) |
container_volume | 17 |
creator | Schinianakis, Dimitris |
description | This article attempts to provide a set of new directions and ideas for research in the ever vibrant fields of telecom and IoT security. It attempts by no means to present a complete set of security solutions; this would be by definition impossible. It rather serves as a short but comprehensive introduction to various technologies and cryptographic techniques in the area of lightweight cryptography in our quest to address the security challenges in the IoT and 5G-connectivity era. We use the term lightweight cryptography interchangeably both for symmetric and suitable asymmetric ciphers, thus covering all aspects of traditional cryptography namely encryption/decryption, authentication, identification, nonrepudiation, integrity protection, and key exchange. Possible usecases that challenge the applicability of lightweight cryptography as well future projections for further discussions are also offered. |
doi_str_mv | 10.1109/MCAS.2017.2757080 |
format | Magazinearticle |
fullrecord | <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_ieee_primary_8115346</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8115346</ieee_id><sourcerecordid>10_1109_MCAS_2017_2757080</sourcerecordid><originalsourceid>FETCH-LOGICAL-c265t-8ba22edfe6a35c046832cd207c0ccdbf972350d6ecfb32704ea73746112066b43</originalsourceid><addsrcrecordid>eNo9z81Kw0AUBeBBFKzVBxA38wKJd_6nyxBqLVS6aAV3w2RygyM1KZMo9O1NaHF17-KcAx8hjwxyxmDx_FYWu5wDMzk3yoCFKzJjStkMrIDr6Rcs00J_3JK7vv-CMamVnBFeHAZMrR_iL9Idhp8UhxPdHofYtT2NLR0-kaoV9W1N192eLpO_JzeNP_T4cLlz8v6y3Jev2Wa7WpfFJgtcqyGzlecc6wa1FyqA1FbwUHMwAUKoq2ZhuFBQawxNJbgBid4IIzVjHLSupJgTdt4Nqev7hI07pvjt08kxcBPaTWg3od0FPXaezp2IiP95y0a-1OIPAQRRXQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype></control><display><type>magazinearticle</type><title>Alternative Security Options in the 5G and IoT Era</title><source>IEEE Electronic Library (IEL)</source><creator>Schinianakis, Dimitris</creator><creatorcontrib>Schinianakis, Dimitris</creatorcontrib><description>This article attempts to provide a set of new directions and ideas for research in the ever vibrant fields of telecom and IoT security. It attempts by no means to present a complete set of security solutions; this would be by definition impossible. It rather serves as a short but comprehensive introduction to various technologies and cryptographic techniques in the area of lightweight cryptography in our quest to address the security challenges in the IoT and 5G-connectivity era. We use the term lightweight cryptography interchangeably both for symmetric and suitable asymmetric ciphers, thus covering all aspects of traditional cryptography namely encryption/decryption, authentication, identification, nonrepudiation, integrity protection, and key exchange. Possible usecases that challenge the applicability of lightweight cryptography as well future projections for further discussions are also offered.</description><identifier>ISSN: 1531-636X</identifier><identifier>EISSN: 1558-0830</identifier><identifier>DOI: 10.1109/MCAS.2017.2757080</identifier><identifier>CODEN: ICSYDV</identifier><language>eng</language><publisher>IEEE</publisher><subject>5G mobile communications ; Algorithm design and analysis ; Cryptography ; Elliptic curve cryptography ; Internet of Things ; Network security ; Security</subject><ispartof>IEEE circuits and systems magazine (New York, N.Y. 2001), 2017-01, Vol.17 (4), p.6-28</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c265t-8ba22edfe6a35c046832cd207c0ccdbf972350d6ecfb32704ea73746112066b43</citedby><cites>FETCH-LOGICAL-c265t-8ba22edfe6a35c046832cd207c0ccdbf972350d6ecfb32704ea73746112066b43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8115346$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,796,27923,54756</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8115346$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Schinianakis, Dimitris</creatorcontrib><title>Alternative Security Options in the 5G and IoT Era</title><title>IEEE circuits and systems magazine (New York, N.Y. 2001)</title><addtitle>CAS-M</addtitle><description>This article attempts to provide a set of new directions and ideas for research in the ever vibrant fields of telecom and IoT security. It attempts by no means to present a complete set of security solutions; this would be by definition impossible. It rather serves as a short but comprehensive introduction to various technologies and cryptographic techniques in the area of lightweight cryptography in our quest to address the security challenges in the IoT and 5G-connectivity era. We use the term lightweight cryptography interchangeably both for symmetric and suitable asymmetric ciphers, thus covering all aspects of traditional cryptography namely encryption/decryption, authentication, identification, nonrepudiation, integrity protection, and key exchange. Possible usecases that challenge the applicability of lightweight cryptography as well future projections for further discussions are also offered.</description><subject>5G mobile communications</subject><subject>Algorithm design and analysis</subject><subject>Cryptography</subject><subject>Elliptic curve cryptography</subject><subject>Internet of Things</subject><subject>Network security</subject><subject>Security</subject><issn>1531-636X</issn><issn>1558-0830</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2017</creationdate><recordtype>magazinearticle</recordtype><sourceid>RIE</sourceid><recordid>eNo9z81Kw0AUBeBBFKzVBxA38wKJd_6nyxBqLVS6aAV3w2RygyM1KZMo9O1NaHF17-KcAx8hjwxyxmDx_FYWu5wDMzk3yoCFKzJjStkMrIDr6Rcs00J_3JK7vv-CMamVnBFeHAZMrR_iL9Idhp8UhxPdHofYtT2NLR0-kaoV9W1N192eLpO_JzeNP_T4cLlz8v6y3Jev2Wa7WpfFJgtcqyGzlecc6wa1FyqA1FbwUHMwAUKoq2ZhuFBQawxNJbgBid4IIzVjHLSupJgTdt4Nqev7hI07pvjt08kxcBPaTWg3od0FPXaezp2IiP95y0a-1OIPAQRRXQ</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Schinianakis, Dimitris</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20170101</creationdate><title>Alternative Security Options in the 5G and IoT Era</title><author>Schinianakis, Dimitris</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c265t-8ba22edfe6a35c046832cd207c0ccdbf972350d6ecfb32704ea73746112066b43</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2017</creationdate><topic>5G mobile communications</topic><topic>Algorithm design and analysis</topic><topic>Cryptography</topic><topic>Elliptic curve cryptography</topic><topic>Internet of Things</topic><topic>Network security</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Schinianakis, Dimitris</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE circuits and systems magazine (New York, N.Y. 2001)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Schinianakis, Dimitris</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Alternative Security Options in the 5G and IoT Era</atitle><jtitle>IEEE circuits and systems magazine (New York, N.Y. 2001)</jtitle><stitle>CAS-M</stitle><date>2017-01-01</date><risdate>2017</risdate><volume>17</volume><issue>4</issue><spage>6</spage><epage>28</epage><pages>6-28</pages><issn>1531-636X</issn><eissn>1558-0830</eissn><coden>ICSYDV</coden><abstract>This article attempts to provide a set of new directions and ideas for research in the ever vibrant fields of telecom and IoT security. It attempts by no means to present a complete set of security solutions; this would be by definition impossible. It rather serves as a short but comprehensive introduction to various technologies and cryptographic techniques in the area of lightweight cryptography in our quest to address the security challenges in the IoT and 5G-connectivity era. We use the term lightweight cryptography interchangeably both for symmetric and suitable asymmetric ciphers, thus covering all aspects of traditional cryptography namely encryption/decryption, authentication, identification, nonrepudiation, integrity protection, and key exchange. Possible usecases that challenge the applicability of lightweight cryptography as well future projections for further discussions are also offered.</abstract><pub>IEEE</pub><doi>10.1109/MCAS.2017.2757080</doi><tpages>23</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1531-636X |
ispartof | IEEE circuits and systems magazine (New York, N.Y. 2001), 2017-01, Vol.17 (4), p.6-28 |
issn | 1531-636X 1558-0830 |
language | eng |
recordid | cdi_ieee_primary_8115346 |
source | IEEE Electronic Library (IEL) |
subjects | 5G mobile communications Algorithm design and analysis Cryptography Elliptic curve cryptography Internet of Things Network security Security |
title | Alternative Security Options in the 5G and IoT Era |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T23%3A44%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Alternative%20Security%20Options%20in%20the%205G%20and%20IoT%20Era&rft.jtitle=IEEE%20circuits%20and%20systems%20magazine%20(New%20York,%20N.Y.%202001)&rft.au=Schinianakis,%20Dimitris&rft.date=2017-01-01&rft.volume=17&rft.issue=4&rft.spage=6&rft.epage=28&rft.pages=6-28&rft.issn=1531-636X&rft.eissn=1558-0830&rft.coden=ICSYDV&rft_id=info:doi/10.1109/MCAS.2017.2757080&rft_dat=%3Ccrossref_RIE%3E10_1109_MCAS_2017_2757080%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8115346&rfr_iscdi=true |