Alternative Security Options in the 5G and IoT Era

This article attempts to provide a set of new directions and ideas for research in the ever vibrant fields of telecom and IoT security. It attempts by no means to present a complete set of security solutions; this would be by definition impossible. It rather serves as a short but comprehensive intro...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE circuits and systems magazine (New York, N.Y. 2001) N.Y. 2001), 2017-01, Vol.17 (4), p.6-28
1. Verfasser: Schinianakis, Dimitris
Format: Magazinearticle
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 28
container_issue 4
container_start_page 6
container_title IEEE circuits and systems magazine (New York, N.Y. 2001)
container_volume 17
creator Schinianakis, Dimitris
description This article attempts to provide a set of new directions and ideas for research in the ever vibrant fields of telecom and IoT security. It attempts by no means to present a complete set of security solutions; this would be by definition impossible. It rather serves as a short but comprehensive introduction to various technologies and cryptographic techniques in the area of lightweight cryptography in our quest to address the security challenges in the IoT and 5G-connectivity era. We use the term lightweight cryptography interchangeably both for symmetric and suitable asymmetric ciphers, thus covering all aspects of traditional cryptography namely encryption/decryption, authentication, identification, nonrepudiation, integrity protection, and key exchange. Possible usecases that challenge the applicability of lightweight cryptography as well future projections for further discussions are also offered.
doi_str_mv 10.1109/MCAS.2017.2757080
format Magazinearticle
fullrecord <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_ieee_primary_8115346</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8115346</ieee_id><sourcerecordid>10_1109_MCAS_2017_2757080</sourcerecordid><originalsourceid>FETCH-LOGICAL-c265t-8ba22edfe6a35c046832cd207c0ccdbf972350d6ecfb32704ea73746112066b43</originalsourceid><addsrcrecordid>eNo9z81Kw0AUBeBBFKzVBxA38wKJd_6nyxBqLVS6aAV3w2RygyM1KZMo9O1NaHF17-KcAx8hjwxyxmDx_FYWu5wDMzk3yoCFKzJjStkMrIDr6Rcs00J_3JK7vv-CMamVnBFeHAZMrR_iL9Idhp8UhxPdHofYtT2NLR0-kaoV9W1N192eLpO_JzeNP_T4cLlz8v6y3Jev2Wa7WpfFJgtcqyGzlecc6wa1FyqA1FbwUHMwAUKoq2ZhuFBQawxNJbgBid4IIzVjHLSupJgTdt4Nqev7hI07pvjt08kxcBPaTWg3od0FPXaezp2IiP95y0a-1OIPAQRRXQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype></control><display><type>magazinearticle</type><title>Alternative Security Options in the 5G and IoT Era</title><source>IEEE Electronic Library (IEL)</source><creator>Schinianakis, Dimitris</creator><creatorcontrib>Schinianakis, Dimitris</creatorcontrib><description>This article attempts to provide a set of new directions and ideas for research in the ever vibrant fields of telecom and IoT security. It attempts by no means to present a complete set of security solutions; this would be by definition impossible. It rather serves as a short but comprehensive introduction to various technologies and cryptographic techniques in the area of lightweight cryptography in our quest to address the security challenges in the IoT and 5G-connectivity era. We use the term lightweight cryptography interchangeably both for symmetric and suitable asymmetric ciphers, thus covering all aspects of traditional cryptography namely encryption/decryption, authentication, identification, nonrepudiation, integrity protection, and key exchange. Possible usecases that challenge the applicability of lightweight cryptography as well future projections for further discussions are also offered.</description><identifier>ISSN: 1531-636X</identifier><identifier>EISSN: 1558-0830</identifier><identifier>DOI: 10.1109/MCAS.2017.2757080</identifier><identifier>CODEN: ICSYDV</identifier><language>eng</language><publisher>IEEE</publisher><subject>5G mobile communications ; Algorithm design and analysis ; Cryptography ; Elliptic curve cryptography ; Internet of Things ; Network security ; Security</subject><ispartof>IEEE circuits and systems magazine (New York, N.Y. 2001), 2017-01, Vol.17 (4), p.6-28</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c265t-8ba22edfe6a35c046832cd207c0ccdbf972350d6ecfb32704ea73746112066b43</citedby><cites>FETCH-LOGICAL-c265t-8ba22edfe6a35c046832cd207c0ccdbf972350d6ecfb32704ea73746112066b43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8115346$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,796,27923,54756</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8115346$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Schinianakis, Dimitris</creatorcontrib><title>Alternative Security Options in the 5G and IoT Era</title><title>IEEE circuits and systems magazine (New York, N.Y. 2001)</title><addtitle>CAS-M</addtitle><description>This article attempts to provide a set of new directions and ideas for research in the ever vibrant fields of telecom and IoT security. It attempts by no means to present a complete set of security solutions; this would be by definition impossible. It rather serves as a short but comprehensive introduction to various technologies and cryptographic techniques in the area of lightweight cryptography in our quest to address the security challenges in the IoT and 5G-connectivity era. We use the term lightweight cryptography interchangeably both for symmetric and suitable asymmetric ciphers, thus covering all aspects of traditional cryptography namely encryption/decryption, authentication, identification, nonrepudiation, integrity protection, and key exchange. Possible usecases that challenge the applicability of lightweight cryptography as well future projections for further discussions are also offered.</description><subject>5G mobile communications</subject><subject>Algorithm design and analysis</subject><subject>Cryptography</subject><subject>Elliptic curve cryptography</subject><subject>Internet of Things</subject><subject>Network security</subject><subject>Security</subject><issn>1531-636X</issn><issn>1558-0830</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2017</creationdate><recordtype>magazinearticle</recordtype><sourceid>RIE</sourceid><recordid>eNo9z81Kw0AUBeBBFKzVBxA38wKJd_6nyxBqLVS6aAV3w2RygyM1KZMo9O1NaHF17-KcAx8hjwxyxmDx_FYWu5wDMzk3yoCFKzJjStkMrIDr6Rcs00J_3JK7vv-CMamVnBFeHAZMrR_iL9Idhp8UhxPdHofYtT2NLR0-kaoV9W1N192eLpO_JzeNP_T4cLlz8v6y3Jev2Wa7WpfFJgtcqyGzlecc6wa1FyqA1FbwUHMwAUKoq2ZhuFBQawxNJbgBid4IIzVjHLSupJgTdt4Nqev7hI07pvjt08kxcBPaTWg3od0FPXaezp2IiP95y0a-1OIPAQRRXQ</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Schinianakis, Dimitris</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20170101</creationdate><title>Alternative Security Options in the 5G and IoT Era</title><author>Schinianakis, Dimitris</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c265t-8ba22edfe6a35c046832cd207c0ccdbf972350d6ecfb32704ea73746112066b43</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2017</creationdate><topic>5G mobile communications</topic><topic>Algorithm design and analysis</topic><topic>Cryptography</topic><topic>Elliptic curve cryptography</topic><topic>Internet of Things</topic><topic>Network security</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Schinianakis, Dimitris</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE circuits and systems magazine (New York, N.Y. 2001)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Schinianakis, Dimitris</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Alternative Security Options in the 5G and IoT Era</atitle><jtitle>IEEE circuits and systems magazine (New York, N.Y. 2001)</jtitle><stitle>CAS-M</stitle><date>2017-01-01</date><risdate>2017</risdate><volume>17</volume><issue>4</issue><spage>6</spage><epage>28</epage><pages>6-28</pages><issn>1531-636X</issn><eissn>1558-0830</eissn><coden>ICSYDV</coden><abstract>This article attempts to provide a set of new directions and ideas for research in the ever vibrant fields of telecom and IoT security. It attempts by no means to present a complete set of security solutions; this would be by definition impossible. It rather serves as a short but comprehensive introduction to various technologies and cryptographic techniques in the area of lightweight cryptography in our quest to address the security challenges in the IoT and 5G-connectivity era. We use the term lightweight cryptography interchangeably both for symmetric and suitable asymmetric ciphers, thus covering all aspects of traditional cryptography namely encryption/decryption, authentication, identification, nonrepudiation, integrity protection, and key exchange. Possible usecases that challenge the applicability of lightweight cryptography as well future projections for further discussions are also offered.</abstract><pub>IEEE</pub><doi>10.1109/MCAS.2017.2757080</doi><tpages>23</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1531-636X
ispartof IEEE circuits and systems magazine (New York, N.Y. 2001), 2017-01, Vol.17 (4), p.6-28
issn 1531-636X
1558-0830
language eng
recordid cdi_ieee_primary_8115346
source IEEE Electronic Library (IEL)
subjects 5G mobile communications
Algorithm design and analysis
Cryptography
Elliptic curve cryptography
Internet of Things
Network security
Security
title Alternative Security Options in the 5G and IoT Era
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T23%3A44%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Alternative%20Security%20Options%20in%20the%205G%20and%20IoT%20Era&rft.jtitle=IEEE%20circuits%20and%20systems%20magazine%20(New%20York,%20N.Y.%202001)&rft.au=Schinianakis,%20Dimitris&rft.date=2017-01-01&rft.volume=17&rft.issue=4&rft.spage=6&rft.epage=28&rft.pages=6-28&rft.issn=1531-636X&rft.eissn=1558-0830&rft.coden=ICSYDV&rft_id=info:doi/10.1109/MCAS.2017.2757080&rft_dat=%3Ccrossref_RIE%3E10_1109_MCAS_2017_2757080%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8115346&rfr_iscdi=true