{"id":"https://openalex.org/W2738286396","doi":"https://doi.org/10.1109/iwcmc.2017.7986606","title":"Access control in 5G communication networks using simple PKI certificates","display_name":"Access control in 5G communication networks using simple PKI certificates","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2738286396","doi":"https://doi.org/10.1109/iwcmc.2017.7986606","mag":"2738286396"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2017.7986606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2017.7986606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028422692","display_name":"Wided Boubakri","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Wided Boubakri","raw_affiliation_strings":["Communication Networks and Security research Lab, University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Communication Networks and Security research Lab, University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025478746","display_name":"Walid Abdallah","orcid":"https://orcid.org/0000-0003-1019-8199"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Walid Abdallah","raw_affiliation_strings":["Communication Networks and Security research Lab, University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Communication Networks and Security research Lab, University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113487171","display_name":"Noureddine Boudriga","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Noureddine Boudriga","raw_affiliation_strings":["Communication Networks and Security research Lab, University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Communication Networks and Security research Lab, University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028422692"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":1.1701,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.84087016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"2092","last_page":"2097"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8194319605827332},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.720239520072937},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6554369926452637},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6166272163391113},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.577289879322052},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5400832891464233},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.46897944808006287},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4655137062072754},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.457492470741272},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.43859708309173584},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2770856022834778},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2610486149787903},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2244214117527008}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8194319605827332},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.720239520072937},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6554369926452637},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6166272163391113},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.577289879322052},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5400832891464233},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.46897944808006287},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4655137062072754},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.457492470741272},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.43859708309173584},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2770856022834778},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2610486149787903},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2244214117527008},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2017.7986606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2017.7986606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321108","display_name":"Academy of Finland","ror":"https://ror.org/05k73zm37"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1984451560","https://openalex.org/W1991915713","https://openalex.org/W1993087005","https://openalex.org/W2029090942","https://openalex.org/W2119928092","https://openalex.org/W2122505524","https://openalex.org/W2481762450","https://openalex.org/W2545788080"],"related_works":["https://openalex.org/W2520149731","https://openalex.org/W1981519115","https://openalex.org/W1985631144","https://openalex.org/W2387152933","https://openalex.org/W2087123996","https://openalex.org/W3111553259","https://openalex.org/W2103264866","https://openalex.org/W2356023093","https://openalex.org/W53279813","https://openalex.org/W2115561238"],"abstract_inverted_index":{"5G":[0,79],"mobile":[1,51],"communication":[2,75],"is":[3,70,115,123,170],"being":[4],"designed":[5,77],"as":[6],"heterogeneous":[7],"network":[8,36],"where":[9],"different":[10,108],"platforms,":[11],"several":[12],"technologies,":[13],"and":[14,29,43,88,110,122,160,176],"various":[15,103],"cell":[16],"sizes":[17],"are":[18],"deployed":[19,50],"to":[20,39,125,139,148],"fit":[21],"specific":[22],"requirements":[23],"in":[24,155],"terms":[25,156],"of":[26,34,49,105,152,157],"data":[27],"rates":[28],"latency.":[30,162],"The":[31,112],"heterogeneity":[32],"nature":[33],"this":[35,57,99],"will":[37,136],"lead":[38],"new":[40],"security":[41,94],"issues":[42],"threats,":[44],"especially":[45],"when":[46],"the":[47,96,150],"number":[48],"devices":[52],"become":[53],"very":[54],"important.":[55],"In":[56,81],"paper,":[58],"we":[59,83,101],"propose":[60],"a":[61,73,85],"simple":[62],"PKI":[63],"certificate":[64],"based":[65,116],"access":[66],"control":[67],"scheme":[68,114,154,169],"that":[69,91,135,167],"implemented":[71],"on":[72,117],"multi-layer":[74],"architecture":[76],"for":[78],"networks.":[80],"addition,":[82],"establish":[84],"scalable":[86,172],"authentication":[87,113,175],"handover":[89,177],"schemes":[90],"can":[92],"ensure":[93],"within":[95],"network.":[97],"To":[98],"purpose,":[100],"define":[102],"types":[104],"certificates":[106,134],"with":[107],"features":[109],"utilization.":[111],"zero":[118],"knowledge":[119],"proof":[120],"(ZKP)":[121],"used":[124,138],"achieve":[126],"secure":[127,141],"device":[128],"registration":[129],"procedure":[130],"before":[131],"generating":[132],"authorization":[133],"be":[137],"enable":[140],"device-to-device":[142],"communication.":[143],"We":[144],"use":[145],"simulation":[146],"work":[147],"assess":[149],"efficiency":[151],"our":[153,168],"total":[158],"overhead":[159],"average":[161],"Performance":[163],"evaluation":[164],"results":[165],"show":[166],"more":[171],"than":[173],"existing":[174],"schemes.":[178]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
