{"id":"https://openalex.org/W4402835406","doi":"https://doi.org/10.1109/vtc2024-spring62846.2024.10683685","title":"Leveraging Group Secret Sharing Technology for FD-RAN: A Lightweight AKA Mechanism","display_name":"Leveraging Group Secret Sharing Technology for FD-RAN: A Lightweight AKA Mechanism","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4402835406","doi":"https://doi.org/10.1109/vtc2024-spring62846.2024.10683685"},"language":"en","primary_location":{"id":"doi:10.1109/vtc2024-spring62846.2024.10683685","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2024-spring62846.2024.10683685","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116337739","display_name":"Ning Wang","orcid":"https://orcid.org/0000-0003-4254-6848"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ning Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101529846","display_name":"Jiacheng Chen","orcid":"https://orcid.org/0000-0002-2021-4570"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiacheng Chen","raw_affiliation_strings":["Peng Cheng Laboratory,Department of Strategic and Advanced Interdisciplinary Research,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"Peng Cheng Laboratory,Department of Strategic and Advanced Interdisciplinary Research,Shenzhen,China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033931001","display_name":"Jianbing Ni","orcid":"https://orcid.org/0000-0002-5639-0883"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jianbing Ni","raw_affiliation_strings":["Queen&#x0027;s University,Department of Electrical and Computer Engineering,Kingston,ON,Canada"],"affiliations":[{"raw_affiliation_string":"Queen&#x0027;s University,Department of Electrical and Computer Engineering,Kingston,ON,Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030223441","display_name":"Liquan Chen","orcid":"https://orcid.org/0000-0002-7202-4939"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liquan Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043286765","display_name":"Haibo Zhou","orcid":"https://orcid.org/0000-0002-6549-8917"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibo Zhou","raw_affiliation_strings":["School of Electronic Science and Engineering, Nanjing University,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, Nanjing University,Nanjing,China","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5116337739"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.3637,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67168675,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.7824000120162964,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.7824000120162964,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.7764999866485596,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.7210000157356262,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/aka","display_name":"AKA","score":0.7975035309791565},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6759551167488098},{"id":"https://openalex.org/keywords/ran","display_name":"Ran","score":0.6188578009605408},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.5589247345924377},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.49941086769104004},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.48724260926246643},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4007752537727356},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3333849310874939},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2680717408657074},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.05912959575653076}],"concepts":[{"id":"https://openalex.org/C121158502","wikidata":"https://www.wikidata.org/wiki/Q4652161","display_name":"AKA","level":2,"score":0.7975035309791565},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6759551167488098},{"id":"https://openalex.org/C160704184","wikidata":"https://www.wikidata.org/wiki/Q18031028","display_name":"Ran","level":2,"score":0.6188578009605408},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.5589247345924377},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.49941086769104004},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.48724260926246643},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4007752537727356},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3333849310874939},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2680717408657074},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.05912959575653076},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2024-spring62846.2024.10683685","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2024-spring62846.2024.10683685","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6351160237","display_name":null,"funder_award_id":"62271244","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1552986816","https://openalex.org/W2001743409","https://openalex.org/W2010939995","https://openalex.org/W2996615959","https://openalex.org/W3008651604","https://openalex.org/W3011076322","https://openalex.org/W3189719988","https://openalex.org/W4213061865","https://openalex.org/W4362653995"],"related_works":["https://openalex.org/W1766728438","https://openalex.org/W1668090144","https://openalex.org/W2504993638","https://openalex.org/W2083168956","https://openalex.org/W2980853820","https://openalex.org/W404373762","https://openalex.org/W2186004379","https://openalex.org/W2107427363","https://openalex.org/W2132764178","https://openalex.org/W2090788874"],"abstract_inverted_index":{"With":[0],"rapid":[1],"advances":[2],"in":[3,104,158],"communication":[4,62,152,214],"technology,":[5],"a":[6,130],"new":[7],"access":[8,14,98,108,156],"architecture":[9],"of":[10,51,71,91,119,188,216],"fully":[11],"decoupled":[12],"radio":[13],"network":[15],"(FD-RAN)":[16],"has":[17],"been":[18],"proposed.":[19],"FD-RAN":[20,221],"completely":[21],"decouples":[22],"the":[23,46,52,69,89,96,168,179,186,201,211,220],"base":[24,30,35,40],"station":[25,31,36,41],"(BS)":[26],"into":[27],"uplink":[28,47],"data":[29,34,50],"(UBS),":[32],"downlink":[33,49],"(DBS),":[37],"and":[38,48,60,74,110,133,164,173,181,191,196,209,213],"control":[39,58],"(CBS).":[42],"Different":[43],"BSs":[44,94],"handle":[45],"user":[53,75,180],"plane,":[54],"as":[55,57,88],"well":[56],"signaling,":[59],"facilitate":[61],"needs":[63],"through":[64],"multi-BS":[65,72,150],"cooperation.":[66],"To":[67],"ensure":[68],"security":[70,99,109,157],"cooperation":[73],"access,":[76],"it":[77,113],"becomes":[78,114],"imperative":[79],"to":[80,116,148],"conduct":[81],"key":[82,134,166,175,217],"negotiations":[83],"among":[84],"multiple":[85],"parties.":[86],"However,":[87],"number":[90],"simultaneously":[92],"accessed":[93],"increases,":[95],"existing":[97],"mechanism":[100],"imposes":[101],"excessive":[102],"overhead":[103],"FD-RAN,":[105],"compromising":[106],"both":[107,178],"efficiency.":[111],"Additionally,":[112],"susceptible":[115],"distributed":[117],"denial":[118],"service":[120],"(DDoS)":[121],"attacks":[122],"launched":[123],"by":[124],"potential":[125],"attackers.":[126],"This":[127],"paper":[128],"introduces":[129],"lightweight":[131],"authentication":[132],"agreement":[135],"(AKA)":[136],"protocol":[137,170],"based":[138],"on":[139,177],"secret":[140],"value":[141],"(<tex":[142],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[143],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$m_{i},\\":[144],"n_{i}$</tex>)":[145],"sharing":[146],"technology":[147],"negotiate":[149],"group":[151],"keys,":[153],"which":[154,184],"ensures":[155],"FD-RAN.":[159],"By":[160],"leveraging":[161],"interpolation":[162],"polynomial":[163],"multi-party":[165],"negotiation,":[167],"proposed":[169,202],"achieves":[171],"efficient":[172],"cost-effective":[174],"negotiation":[176,218],"BS":[182],"sides,":[183],"mitigates":[185],"risk":[187],"man-in-the-middle":[189],"(MitM)":[190],"DDoS":[192],"attacks.":[193],"Security":[194],"analysis":[195],"further":[197],"evaluation":[198],"show":[199],"that":[200],"scheme":[203],"can":[204],"resist":[205],"various":[206],"known":[207],"attacks,":[208],"guarantee":[210],"computational":[212],"efficiency":[215],"within":[219],"context.":[222]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
