Advanced SearchSearch Tips
Performance Analysis of Key Exchange Protocols on ETSI Standard
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Performance Analysis of Key Exchange Protocols on ETSI Standard
Lee, Young-Seok; Choi, Hoon;
  PDF(new window)
The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the security functions in ETSI(European Telecommunications Standards Institute), and analyze the specification of the security primitives and the key exchange protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(Network Control Centre). ETSI key exchange protocols consists of Main Key Exchange, Quick Key Exchange, and Explicit Key Exchange. We analyse the pros and cons of key exchange protocols based on performance analysis and performance evaluation.
ETSI;Key exchange protocol;NCC;RCST;Authentication;
 Cited by
Zhong Yantao and Ma Jianfeng, "A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication", JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 12, NO 6, 2010

ETSI EN 301 790 V1.2.2 : "Digital Video Broadcasting(DVB) : Interaction channel for satellite distribution systems" 2000.12, European Standard (Telecommunications series).

Sergio PARDO MARTINEZ, "Estudio de algoritmos basados en DAMA para la distribuction de ancho de banda en redes DVB-RCS", 2010

Heung-Ryong Oh,Heung-Youl Youm, "Key Exchange Protocols for Domestic Broadband Satellite Access Network," Korea Industrial of Information Security & Cryptology, Vol. 14, No. 3, pp.13-24, 2004.6.

Sam Tran and Tuan Anh Nguyen, "Encryption/Decryption functions for NS-2", CSCI 5931 Project 2, 2005

Young-seok Lee, "Device Authentication Method for Safe Internet of Things Environments," Korea Institute of Information, Electronics, and Communication Technology, Vol.8, No.1, pp. 51-58. 22015. 1. crossref(new window)