kth.sePublications
Change search
Link to record
Permanent link

Direct link
Näslund, Mats
Publications (5 of 5) Show all publications
Arfaoul, G., Bisson, P., Blom, R., Borgaonkar, R., Englund, H., Felix, E., . . . Zahariev, A. (2018). A Security Architecture for 5G Networks. IEEE Access, 6, 22466-22479
Open this publication in new window or tab >>A Security Architecture for 5G Networks
Show others...
2018 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 6, p. 22466-22479Article in journal (Refereed) Published
Abstract [en]

5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization.

Place, publisher, year, edition, pages
IEEE, 2018
Keywords
Telecommunication networks, 5G, security, architecture
National Category
Media and Communication Studies
Identifiers
urn:nbn:se:kth:diva-240252 (URN)10.1109/ACCESS.2018.2827419 (DOI)000432067900001 ()2-s2.0-85045763510 (Scopus ID)
Funder
EU, Horizon 2020, 671562
Available from: 2018-12-13 Created: 2018-12-13 Last updated: 2025-02-17Bibliographically approved
Dubrova, E., Selander, G., Näslund, M. & Lindqvist, F. (2018). Lightweight message authentication for constrained devices. In: WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks: . Paper presented at 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2018, 18 June 2018 through 20 June 2018 (pp. 196-201). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Lightweight message authentication for constrained devices
2018 (English)In: WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery (ACM), 2018, p. 196-201Conference paper, Published paper (Refereed)
Abstract [en]

Message Authentication Codes (MACs) used in today's wireless communication standards may not be able to satisfy resource limitations of simpler 5G radio types and use cases such as machine type communications. As a possible solution, we present a lightweight message authentication scheme based on the cyclic redundancy check (CRC). It has been previously shown that a CRC with an irreducible generator polynomial as the key is an -almost XOR-universal (AXU) hash function with = (m + n)/2n-1, where m is the message size and n is the CRC size. While the computation of n-bit CRCs can be efficiently implemented in hardware using linear feedback shift registers, generating random degree-n irreducible polynomials is computationally expensive for large n. We propose using a product of k irreducible polynomials whose degrees sum up to n as a generator polynomial for an n-bit CRC and show that the resulting hash functions are -AXU with = (m + n)k/2n -k. The presented message authentication scheme can be seen as providing a trade-off between security and implementation efficiency.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2018
Keywords
CRC, Data integrity, Message authentication, Universal hashing
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-238189 (URN)10.1145/3212480.3212482 (DOI)000456097500020 ()2-s2.0-85050922730 (Scopus ID)9781450357319 (ISBN)
Conference
11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2018, 18 June 2018 through 20 June 2018
Note

QC 20181120

Available from: 2018-11-20 Created: 2018-11-20 Last updated: 2024-03-18Bibliographically approved
Yu, Y., Dubrova, E., Näslund, M. & Tao, S. (2018). On Designing PUF-Based TRNGs with Known Answer Tests. In: Nurmi, J Ellervee, P Mihhailov, J Jenihhin, M Tammemae, K (Ed.), 2018 IEEE Nordic Circuits and Systems Conference, NORCAS 2018: NORCHIP and International Symposium of System-on-Chip, SoC 2018 - Proceedings: . Paper presented at 4th IEEE Nordic Circuits and Systems Conference, NORCAS 2018: NORCHIP and International Symposium of System-on-Chip, SoC 2018; Tallinn; Estonia; 30 October 2018 through 31 October 2018. Institute of Electrical and Electronics Engineers (IEEE), Article ID 8573489.
Open this publication in new window or tab >>On Designing PUF-Based TRNGs with Known Answer Tests
2018 (English)In: 2018 IEEE Nordic Circuits and Systems Conference, NORCAS 2018: NORCHIP and International Symposium of System-on-Chip, SoC 2018 - Proceedings / [ed] Nurmi, J Ellervee, P Mihhailov, J Jenihhin, M Tammemae, K, Institute of Electrical and Electronics Engineers (IEEE), 2018, article id 8573489Conference paper, Published paper (Refereed)
Abstract [en]

Random numbers are widely used in cryptographic algorithms and protocols. A faulty true random number generator (TRNG) may open a door into a system in spite of cryptographic protection. It is therefore important to design TRNGs so that they can be tested at different stages of their lifetime to assure their trustworthiness. In this paper, we propose a method for designing physical unclonable function (PUF)-based TRNGs which can be tested in-field by known answer tests. We present a prototype FPGA implementation of the proposed TRNG based on an arbiter PUF which passes all NIST 800-22 statistical tests and has the minimal entropy of 0.918 estimated according to NIST 800-90B recommendations. This is a nontrivial achievement given that arbiter PUFs are notoriously hard to place in a symmetric manner in FPGAs.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2018
Keywords
TRNG, PRNG, PUF, known answer test
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-249923 (URN)10.1109/NORCHIP.2018.8573489 (DOI)000462188200011 ()2-s2.0-85060609654 (Scopus ID)9781538676561 (ISBN)
Conference
4th IEEE Nordic Circuits and Systems Conference, NORCAS 2018: NORCHIP and International Symposium of System-on-Chip, SoC 2018; Tallinn; Estonia; 30 October 2018 through 31 October 2018
Note

QC 20190426

Available from: 2019-04-26 Created: 2019-04-26 Last updated: 2024-07-23Bibliographically approved
Baumann, C., Näslund, M., Gehrmann, C., Schwarz, O. & Thorsen, H. (2016). A High Assurance Virtualization Platform for ARMv8. In: Networks and Communications (EuCNC), 2016 European Conference on: . Paper presented at European Conference on Networks and Communications (EuCNC), 27-30 June 2016. IEEE conference proceedings
Open this publication in new window or tab >>A High Assurance Virtualization Platform for ARMv8
Show others...
2016 (English)In: Networks and Communications (EuCNC), 2016 European Conference on, IEEE conference proceedings, 2016Conference paper, Published paper (Refereed)
Abstract [en]

This paper presents the first results from the ongoing research project HASPOC, developing a high assurance virtualization platform for the ARMv8 CPU architecture. Formal verification at machine code level guarantees information isolation between different guest systems (e.g. OSs) running on the platform. To use the platform in networking scenarios, we allow guest systems to securely communicate with each other via platform-provided communication channels and to take exclusive control of peripherals for communication with the outside world.

The isolation is shown to be formally equivalent to that of guests executing on physically separate platforms with dedicated communication channels crossing the air-gap. Common Criteria (CC) assurance methodology is applied by preparing the CC documentation required for an EAL6 evaluation of products using the platform. Besides the hypervisor, a secure boot component is included and verified to ensure system integrity.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2016
Keywords
hypervisor, isolation, assurance, formal verification, Common Criteria, ARMv8
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-192598 (URN)10.1109/EuCNC.2016.7561034 (DOI)000387091300042 ()2-s2.0-84988950416 (Scopus ID)978-1-5090-2893-1 (ISBN)978-1-5090-2894-8 (ISBN)
Conference
European Conference on Networks and Communications (EuCNC), 27-30 June 2016
Projects
HASPOC
Funder
VINNOVA
Note

QC 20160920

Available from: 2016-09-15 Created: 2016-09-15 Last updated: 2024-03-18Bibliographically approved
Dubrova, E., Näslund, M., Selander, G. & Tsiatsis, V. (2014). Energy-Efficient Message Authentication for IEEE 802.15.4-Based Wireless Sensor Networks. In: Proceedings of 32nd Nordic Microelectronics Conference NORCHIP : . Paper presented at 32nd Nordic Microelectronics Conference NORCHIP. IEEE conference proceedings
Open this publication in new window or tab >>Energy-Efficient Message Authentication for IEEE 802.15.4-Based Wireless Sensor Networks
2014 (English)In: Proceedings of 32nd Nordic Microelectronics Conference NORCHIP , IEEE conference proceedings, 2014Conference paper, Published paper (Refereed)
Abstract [en]

The number of wirelessly connected devices is expected to increase to a few tens of billions by the year 2020. Newer generations of products and applications will sharpen demands for ultra-low energy consuming wireless devices. Various techniques for energy saving based on Discontinuous Reception (DRX) are known. However, DRX is vulnerable to unauthorized or fake trigger requests by malicious adversaries aiming to drain a device's battery. Existing message authentication methods can identify spoofed messages, but they require the reception of a complete message before its authenticity can be verified. In this paper, we present a method which inserts authentication checkpoints at several positions within a message. This enables a device to identify that a message is unauthorized and turn its radio receiver off as soon as the first checkpoint fails. The presented method has a low complexity with respect to the computational and memory resources and does not slow down the receiver. It can maintain the packet format prescribed by the IEEE 802.15.4 specification, which provides for backward compatibility. Finally, it incorporates authentication checkpoints at the MAC layer, which allows nodes that do not employ the presented method to participate in the communication.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2014
Keywords
Message Authentication, IEEE 802.15.4, WSN
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-165579 (URN)10.1109/NORCHIP.2014.7004700 (DOI)000380487600003 ()2-s2.0-84921467050 (Scopus ID)
Conference
32nd Nordic Microelectronics Conference NORCHIP
Funder
Swedish Foundation for Strategic Research , SM12-0005
Note

QC 20150507

Available from: 2015-04-29 Created: 2015-04-29 Last updated: 2024-03-18Bibliographically approved
Organisations

Search in DiVA

Show all publications