Distributed Trusted Authority-based Key Management for Beyond 5G Network Coding-enabled Mobile Small Cells

The 5G cellular network is projected to be introduced in 2020 and takes advantage of the small cell technology to deliver ubiquitous 5G services in an energy efficient manner. The next logical step is the introduction of network coding-enabled mobile small cells (NC-MSCs). These are networks of mobile devices which can be set up on-the-fly, based on demand, and cover the urban landscape. Furthermore, they allow network offloading through multi-hop device-to-device (D2D) communication to provide high data rate services. In this paper we introduce DISTANT, a decentralized key management scheme specifically designed to provide security in a network which takes advantage of the benefits of NC-MSCs. In our key management scheme, we distribute the certification authority (CA) functions using threshold secret sharing. Each network node is provided with a share of the master private key such that key management services are available “anywhere, anytime”. Finally, our distributed CA takes advantage of the self-generated certificate paradigm. Certificates can therefore be issued and renewed without the interaction of the distributed CA which minimizes the communication overhead.

[1]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[2]  Hugo Krawczyk,et al.  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.

[3]  Junzuo Lai,et al.  Self-Generated-Certificate Public Key Encryption Without Pairing , 2007, Public Key Cryptography.

[4]  Byoung heon Lee Self-Certificate: PKI using Self-Certified Key , 2000 .

[5]  Haiyun Luo,et al.  URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.

[6]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Rafail Ostrovsky,et al.  How To Withstand Mobile Virus Attacks , 1991, PODC 1991.

[9]  Ya-Ju Yu,et al.  Mobile small cell deployment for next generation cellular networks , 2014, 2014 IEEE Global Communications Conference.

[10]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[11]  Patrick Horster,et al.  Self-certified keys — Concepts and Applications , 1997 .

[12]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[13]  Joseph K. Liu,et al.  Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.

[14]  Joonsang Baek,et al.  Certificateless Public Key Encryption Without Pairing , 2005, ISC.

[15]  Ekram Hossain,et al.  5G cellular: key enabling technologies and research challenges , 2015, IEEE Instrumentation & Measurement Magazine.

[16]  Kefei Chen,et al.  Self-generated-certificate public key encryption without pairing and its application , 2011, Inf. Sci..

[17]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[18]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[19]  Stanisław Jarecki,et al.  Proactive secret sharing and public key cryptosystems , 1995 .

[20]  Georgios Mantas,et al.  Key Management for Beyond 5G Mobile Small Cells: A Survey , 2019, IEEE Access.

[21]  Georgios Mantas,et al.  Key Management for Secure Network Coding-Enabled Mobile Small Cells , 2018, BROADNETS.

[22]  Jonathan Rodriguez,et al.  SECRET — Secure network coding for reduced energy next generation mobile small cells: A European Training Network in wireless communications and networking for 5G , 2017, 2017 Internet Technologies and Applications (ITA).

[23]  Marc Girault,et al.  Self-Certified Public Keys , 1991, EUROCRYPT.