{"title":"5G移动网络中物联网设备身份保密新方案的计算开销","authors":"Hiten Choudhury","doi":"10.54290/spect/2020.v7.1.0003","DOIUrl":null,"url":null,"abstract":"Mobile networks are becoming a preferred choice for the Internet of Things (IoT), due to its flexibility, broad coverage, increasing bandwidth, low latency and low subscription cost. However, a long-standing security issue in any mobile network across the various generations is identity confidentiality. In a recent technical specification standardised by 3rd Generation Partnership Project (3GPP) for 5G mobile network, a novel scheme called the Elliptic Curve Integrated Encryption Scheme (ECIES) is adopted to tackle the issue of identity confidentiality. While this mechanism seems to provide a reasonable solution for modern resource affluent smart phones, it’s suitability for resource constrained IoT devices needs to be analysed. In this paper, we study the computational overhead of the ECIES on IoT devices.","PeriodicalId":313430,"journal":{"name":"Spectrum: Science and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Computational Overhead of a Novel Scheme for Identity Confidentiality on IoT Devices in 5G Mobile Networks\",\"authors\":\"Hiten Choudhury\",\"doi\":\"10.54290/spect/2020.v7.1.0003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile networks are becoming a preferred choice for the Internet of Things (IoT), due to its flexibility, broad coverage, increasing bandwidth, low latency and low subscription cost. However, a long-standing security issue in any mobile network across the various generations is identity confidentiality. In a recent technical specification standardised by 3rd Generation Partnership Project (3GPP) for 5G mobile network, a novel scheme called the Elliptic Curve Integrated Encryption Scheme (ECIES) is adopted to tackle the issue of identity confidentiality. While this mechanism seems to provide a reasonable solution for modern resource affluent smart phones, it’s suitability for resource constrained IoT devices needs to be analysed. In this paper, we study the computational overhead of the ECIES on IoT devices.\",\"PeriodicalId\":313430,\"journal\":{\"name\":\"Spectrum: Science and Technology\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Spectrum: Science and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.54290/spect/2020.v7.1.0003\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Spectrum: Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54290/spect/2020.v7.1.0003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Computational Overhead of a Novel Scheme for Identity Confidentiality on IoT Devices in 5G Mobile Networks
Mobile networks are becoming a preferred choice for the Internet of Things (IoT), due to its flexibility, broad coverage, increasing bandwidth, low latency and low subscription cost. However, a long-standing security issue in any mobile network across the various generations is identity confidentiality. In a recent technical specification standardised by 3rd Generation Partnership Project (3GPP) for 5G mobile network, a novel scheme called the Elliptic Curve Integrated Encryption Scheme (ECIES) is adopted to tackle the issue of identity confidentiality. While this mechanism seems to provide a reasonable solution for modern resource affluent smart phones, it’s suitability for resource constrained IoT devices needs to be analysed. In this paper, we study the computational overhead of the ECIES on IoT devices.