Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 168
Filtrar
Mais filtros

Intervalo de ano de publicação
1.
Reprod Biomed Online ; 48(1): 103421, 2024 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-37976658

RESUMO

RESEARCH QUESTION: What effect does direct-to-consumer genetic testing (DTCGT) have on information finding and sharing in relation to gamete donor conception? DESIGN: This study used in-depth qualitative interviews with parents through donor conception, donors, the relatives of donors and donor-conceived people who have used, or considered using, DTCGT. Interviews were conducted between September 2021 and February 2023. Sixty people defined themselves as having been affected by donor conception and DTCGT. Fifty-seven of these were resident in the UK at the time of interview. The final sample included 19 (spermatozoa, egg or embryo) donors, 25 donor-conceived people, 20 parents through donor conception and two relatives of donors. Five participants occupied more than one of these roles. RESULTS: The rise of DTCGT is affecting how information about donor conception is managed: it shifts patterns of knowledge about donor conception; increases flexibility regarding the age of access to information about donor relatives; can lead to a growing role for non-professionals, including wider family members, in gatekeeping information about donor conception; accentuates the effect of donor conception for donors' and the relatives of donor-conceived people; and shapes, and is shaped, by the formal regulatory donor information management systems. CONCLUSION: Fertility professionals should inform people using, or considering, donor conception, or (potential) donors, about the different ways DTCGT can affect sharing information about donor conception. Support is needed for those affected by these changes.


Assuntos
Concepção por Doadores , Inseminação Artificial Heteróloga , Masculino , Humanos , Revelação , Confidencialidade , Doação de Oócitos , Células Germinativas , Doadores de Tecidos , Testes Genéticos
2.
AIDS Care ; 36(8): 1094-1101, 2024 Aug.
Artigo em Inglês | MEDLINE | ID: mdl-38976641

RESUMO

The secrecy surrounding HIV continues to be a major concern for older people living with HIV (OPWH) despite their long-term experience of HIV and the presence of other chronic diseases. Our study aims to highlight how the secrecy surrounding HIV can affect the management of the other conditions. The results of this socio-anthropological sub-study of the ANRS EP66 SEPTAVIH study, which assesses frailty in OPWH, are based on in-depth interviews conducted with 20 OPWH with multimorbidities aged 70 years and over and 9 caregivers. Based on a cross-sectional thematic analysis, this study shows that HIV infection differs from other chronic diseases due to the secrecy and stigma associated with HIV. These specific issues associated with HIV complicate the lives of OPWH, depriving them of support from loved ones and forcing them to exclude their general practitioner from their care system. This then causes OPWH with multiple chronic diseases to become socially vulnerable and isolated. Interventions that support the sharing of information on HIV among OPWH and also among caregivers need to be identified as a matter of urgency in order to improve the lives and management of OPWH with multimorbidities.Trial Registration: ClinicalTrials.gov identifier: NCT03958786.


Assuntos
Cuidadores , Infecções por HIV , Multimorbidade , Estigma Social , Idoso , Idoso de 80 Anos ou mais , Feminino , Humanos , Masculino , Cuidadores/psicologia , Doença Crônica/psicologia , Confidencialidade , Estudos Transversais , Infecções por HIV/psicologia , Pesquisa Qualitativa
3.
BMC Infect Dis ; 24(1): 175, 2024 Feb 08.
Artigo em Inglês | MEDLINE | ID: mdl-38331730

RESUMO

BACKGROUND: Tuberculosis (TB) remains a significant public health burden in Sub-Saharan Africa (SSA), accounting for about 25% of global TB cases. In several communities, TB diagnosis, treatment, and control have become a critical challenge, largely due to the intention to conceal TB status among family members. It is therefore crucial to understand the factors associated with the intentions to conceal TB status among family members in SSA. METHODS: This quantitative study utilised data from the most recent Demographic and Health Surveys (DHS). The objective was to examine the factors associated with the intention to conceal the TB status of family members. The sample consisted of 58,849 individuals aged 10 years or older from seven SSA countries. Binary logistic regression was employed to assess the associations between TB status concealment and various socio-demographic and economic variables. RESULTS: The overall prevalence of TB status concealment intentions for the seven countries was 28.0% (95% CI: 27.6-28.4). Malawi and Eswatini accounted for the highest (47.3%) and lowest (3.0%) prevalence of TB concealment intentions respectively. TB status concealment intentions decreased with increasing age (p < 0.001). Living in rural areas was associated with lower odds of intending to conceal the TB of family members compared to living in urban areas (aOR = 0.92; p = 0.008). Higher education levels were associated with lower odds of TB status concealment intentions (aOR = 0.50; p < 0.001) compared to lower education levels. As participants wealth index increased, the odds of TB status concealment intentions decreased (aOR = 0.83; p < 0.001). Country of residence also showed significant associations with individuals in Ghana (aOR = 4.51; p < 0.001), Lesotho (aOR = 2.08; p < 0.001), Malawi (aOR = 4.10; p < 0.001), Namibia (aOR = 4.40; p < 0.001), and Sao-Tome and Principe (aOR = 5.56; p < 0.001) showing higher odds of TB status concealment intentions compared to Eswatini. CONCLUSIONS: The findings conclude that several social determinants of health, including age, urbanicity, education, and wealth contribute to TB status concealment intentions for family members. Considering these factors is important for designing targeted interventions to improve TB control in the sample. In light of the unavailability of cultural variables in the dataset, future research can leverage qualitative approaches to conduct a more comprehensive exploration of the cultural factors linked to TB status concealment intentions in the population.


Assuntos
Intenção , Tuberculose , Humanos , Inquéritos Epidemiológicos , Família , Tuberculose/epidemiologia , Gana
4.
J Pers ; 92(2): 421-435, 2024 Apr.
Artigo em Inglês | MEDLINE | ID: mdl-36938751

RESUMO

OBJECTIVE: Individuals with a tendency to conceal unflattering information about themselves are more likely to be preoccupied by their secrets and tend to report more negative affect. According to theory, this negative affect is due to self-concealers' conflicting motivation to be authentic in their relationship but fear the negative consequences should they reveal their secrets, which promotes ill-fated attempts to suppress. The purpose of the current study was to test a central component of this model. METHODS: Two studies of adults who were in a romantic relationship and keeping a secret from their partner (combined N = 635; 67.2% women; Mage  = 39.6, SD = 11.9) were surveyed on four biweekly occasions. Multilevel mediation analyses were conducted to test whether preoccupation and suppression mediated the link between self-concealing and negative affect and guilt. RESULTS: The data support the hypotheses. Self-concealers were more preoccupied with and prone to suppress their secret than those low on the trait, which, in turn, predicted greater negative affect and guilt. CONCLUSION: The findings suggest that self-concealers' insecurities and fear of the relational consequences of disclosure set the stage for the debilitating cycle of suppression and preoccupation that leaves them feeling anxious and guilty.


Assuntos
Emoções , Culpa , Adulto , Humanos , Feminino , Masculino , Confidencialidade , Ansiedade , Inquéritos e Questionários
5.
Sensors (Basel) ; 24(1)2024 Jan 03.
Artigo em Inglês | MEDLINE | ID: mdl-38203150

RESUMO

This paper investigates joint beamforming in a secure integrated sensing and communications (ISAC) system assisted by reconfigurable intelligent surfaces (RIS). The system communicates with legitimate downlink users, detecting a potential target, which is a potential eavesdropper attempting to intercept the downlink communication information from the base station (BS) to legitimate users. To enhance the physical-layer secrecy of the system, we design and introduce interference signals at the BS to disrupt eavesdroppers' attempts to intercept legitimate communication information. The BS simultaneously transmits communication and interference signals, both utilized for communication and sensing to guarantee the sensing and communication quality. By jointly optimizing the BS active beamformer and the RIS passive beamforming matrix, we aim to maximize the achievable secrecy rate and radiation power of the system. We develop an effective scheme to find the active beamforming matrix through fractional programming (FP) and semi-definite programming (SDP) techniques and obtain the RIS phase shift matrix via a local search technique. Simulation results validate the effectiveness of the proposed methods in enhancing communication and sensing performance. Additionally, the results demonstrate the effectiveness of introducing the interference signals and RIS in enhancing the physical-layer secrecy of the ISAC system.

6.
Sensors (Basel) ; 24(6)2024 Mar 16.
Artigo em Inglês | MEDLINE | ID: mdl-38544169

RESUMO

In this paper, we explore the secrecy performance of a visible light communication (VLC) system consisting of distributed light-emitting diodes (LEDs) and multiple users (UEs) randomly positioned within an indoor environment while considering the presence of an eavesdropper. To enhance the confidentiality of the system, we formulate a problem of maximizing the sum secrecy rate for UEs by searching for an optimal LED for each UE. Due to the non-convex and non-continuous nature of this security maximization problem, we propose an LED selection algorithm based on tabu search to avoid getting trapped in local optima and expedite the search process by managing trial vectors from previous iterations. Moreover, we introduce three LED selection strategies with a low computational complexity. The simulation results demonstrate that the proposed algorithm achieves a secrecy performance very close to the global optimal value, with a gap of less than 1%. Additionally, the proposed strategies exhibit a performance gap of 28% compared to the global optimal.

7.
Entropy (Basel) ; 26(6)2024 Jun 09.
Artigo em Inglês | MEDLINE | ID: mdl-38920512

RESUMO

We refine and extend Ziv's model and results regarding perfectly secure encryption of individual sequences. According to this model, the encrypter and the legitimate decrypter share a common secret key that is not shared with the unauthorized eavesdropper. The eavesdropper is aware of the encryption scheme and has some prior knowledge concerning the individual plaintext source sequence. This prior knowledge, combined with the cryptogram, is harnessed by the eavesdropper, who implements a finite-state machine as a mechanism for accepting or rejecting attempted guesses of the plaintext source. The encryption is considered perfectly secure if the cryptogram does not provide any new information to the eavesdropper that may enhance their knowledge concerning the plaintext beyond their prior knowledge. Ziv has shown that the key rate needed for perfect secrecy is essentially lower bounded by the finite-state compressibility of the plaintext sequence, a bound that is clearly asymptotically attained through Lempel-Ziv compression followed by one-time pad encryption. In this work, we consider some more general classes of finite-state eavesdroppers and derive the respective lower bounds on the key rates needed for perfect secrecy. These bounds are tighter and more refined than Ziv's bound, and they are attained using encryption schemes that are based on different universal lossless compression schemes. We also extend our findings to the case where side information is available to the eavesdropper and the legitimate decrypter but may or may not be available to the encrypter.

8.
Br J Sociol ; 75(2): 219-231, 2024 Mar.
Artigo em Inglês | MEDLINE | ID: mdl-38193747

RESUMO

There appears to be a mismatch between apparent incompetence in the world and the amount of sociological research it attracts. The aim of this article is to outline a sociology of incompetence and justify its value. I begin by defining incompetence as unsatisfactory performance relative to standards. Incompetence is thus intrinsically sociological in being negotiated and socially (re)constituted. The next section foregrounds how widespread and serious incompetence is. This renders effective sociological understanding crucial to welfare. The article then systematically analyses uses of the term in the British Journal of Sociology (a good quality general journal) to assess the current state of research. This analysis fully confirms the neglect of incompetence as a research topic. The next section proposes suitable methods for preliminary incompetence research addressing distinctive challenges like the stigma of being incompetent. These sections then allow incompetence to be better contextualised by other contributing concepts like power, bureaucracy and meritocracy. The final section justifies suggestions about directions for future research.


Assuntos
Sociologia , Humanos
9.
AIDS Care ; : 1-9, 2023 Dec 29.
Artigo em Inglês | MEDLINE | ID: mdl-38157356

RESUMO

HIV is recognised as a multifaceted chronic disease, bearing psychosocial consequences that potentially impact on the personal and social well-being of those living with it. Adolescents and youth bear a significant proportion of the burden of the HIV epidemic but they have low rates of disclosure of their HIV status. This study aims to determine the views of adolescents living with perinatally acquired HIV on HIV status disclosure among 361 adolescents aged 15-19 in Eswatini. A cross-sectional study was conducted on adolescents who already knew their status, and data were collected using a structured questionnaire. A majority of the participants, 55% (n = 200), were females, and 44% (n = 160) were males. A low number of adolescents (22%) had disclosed their HIV status to anyone. Adolescents who found it difficult to understand disclosure themselves had low levels of onward disclosure (27%) compared to adolescents who better understood the disclosure event. Our results revealed that adolescents' prevalence of HIV status disclosure was low. This raises concerns as some of the adolescents were in relationships with partners who were not aware of their status. However, older adolescents displayed some level of disclosure self-efficacy in that a higher proportion of them disclosed better than younger adolescents.

10.
Cult Health Sex ; 25(7): 914-928, 2023 Jul.
Artigo em Inglês | MEDLINE | ID: mdl-36052961

RESUMO

Until 2018, abortion in the Republic of Ireland was banned in almost all circumstances under one of the most restrictive legal regimes in Europe. The main solution for Irish women and pregnant people seeking abortion services had been to pursue care abroad, typically in clinics in England. In this paper we focus on the hardships of waiting for abortion care experienced by Irish residents leading up to their travel for appointments in England in 2017 and 2018. Based on in-depth interviews with 53 Irish women collected at three British Pregnancy Advisory Services (BPAS) clinics in England we analyse women's experiences as they navigated an 'environment of secrecy' in Ireland. This included making specific secrecy efforts when navigating travel arrangements, conversations, movement, health records, and the travel itself. Despite the expansion of abortion access in Ireland in 2018, the need to travel abroad continues for many women. We argue that the continued need for secrecy when women have to travel abroad for care perpetuates this important phenomenon's invisibility. This argument also applies to other countries where abortion access is restricted, and women are forced to travel for care. We also caution against the presumption that all Irish residents are able to travel internationally for healthcare.


Assuntos
Aborto Induzido , Gravidez , Feminino , Humanos , Irlanda , Europa (Continente) , Inglaterra , Confidencialidade , Aborto Legal
11.
Sensors (Basel) ; 23(20)2023 Oct 10.
Artigo em Inglês | MEDLINE | ID: mdl-37896453

RESUMO

Backscatter communication (BC) systems are a promising technology for internet of things (IoT) applications that allow devices to transmit information by modulating ambient radio signals without the need for a dedicated power source. However, the security of BC systems is a critical concern due to the vulnerability of the wireless channel. This paper investigates the impact of side information (SI) on the secrecy performance of BC systems. SI mainly refers to the additional knowledge that is available to the communicating parties beyond transmitted data, which can be used to enhance reliability, efficiency, security, and quality of service in various communication systems. In particular, in this paper, by considering a non-causally known SI at the transmitter, we derive compact analytical expressions of average secrecy capacity (ASC) and secrecy outage probability (SOP) for the proposed system model to analyze how SI affects the secrecy performance of BC systems. Moreover, a Monte Carlo simulation validates the accuracy of our analytical results and reveals that considering such knowledge at the transmitter has constructive effects on the system performance and ensures reliable communication with higher rates than the conventional BC systems without SI, namely, lower SOP and higher ASC are achievable.

12.
Sensors (Basel) ; 23(19)2023 Sep 25.
Artigo em Inglês | MEDLINE | ID: mdl-37836899

RESUMO

In this paper, we optimize the secrecy capacity of the legitimate user under resource allocation and security constraints for a multi-antenna environment for the simultaneous transmission of wireless information and power in a dynamic downlink scenario. We study the relationship between secrecy capacity and harvested energy in a power-splitting configuration for a nonlinear energy-harvesting model under co-located conditions. The capacity maximization problem is formulated for the vehicle-to-vehicle communication scenario. The formulated problem is non-convex NP-hard, so we reformulate it into a convex form using a divide-and-conquer approach. We obtain the optimal transmit power matrix and power-splitting ratio values that guarantee positive values of the secrecy capacity. We analyze different vehicle-to-vehicle communication settings to validate the differentiation of the proposed algorithm in maintaining both reliability and security. We also substantiate the effectiveness of the proposed approach by analyzing the trade-offs between secrecy capacity and harvested energy.

13.
Sensors (Basel) ; 23(14)2023 Jul 19.
Artigo em Inglês | MEDLINE | ID: mdl-37514815

RESUMO

This paper presents research on the physical layer security performance of a multi-user mixed RF/FSO system based on optimal user interference. In this system model, the RF link experiences Rayleigh fading, and the FSO link follows the Fischer-Snedecor F distribution. The system adopts a double-hop-decode-and-forward (DF) relay scheme. We also consider the effect of directivity errors in the FSO link and assume the presence of an illegal eavesdropper with a single antenna near the RF link. The source node controls the energy collection and information forwarding using a multi-user structure based on simultaneous wireless information and power transfer (SWIPT). We select the optimal user to jam the eavesdropper's communication. We derive closed-form expressions for the mixed RF/FSO communication system's secrecy outage probability (SOP) and average secrecy capacity (ASC). Monte Carlo simulations are performed to verify the accuracy of these expressions. By formulating and simulating the simulation system, the impact of various important factors on the mixed system's physical layer security (PLS) is analyzed. The analysis indicates that increasing the number of antennas and interference signal-to-noise ratio (SNR) of the optimal user, the time allocation factor and energy conversion efficiency, and the improvement in the quality of atmospheric channels with improved weather will significantly enhance this system's PLS.

14.
Sensors (Basel) ; 23(17)2023 Sep 04.
Artigo em Inglês | MEDLINE | ID: mdl-37688109

RESUMO

Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium. Additionally, the eavesdropper also attempts to interrupt the legitimate users' transmission. Thus, in this paper, we study the secrecy performance of a multihop transmission under various eavesdropping attacks for WSNs. To improve the secrecy performance, we propose two node selection schemes in each cluster, namely, minimum node selection (MNS) and optimal node selection (ONS) schemes. To exploit the impact of the network parameters on the secrecy performance, we derive the closed-form expression of the secrecy outage probability (SOP) under different eavesdropping attacks. From the numerical results, the ONS scheme shows the most robust secrecy performance compared with the other schemes. However, the ONS scheme requires a lot of channel information to select the node in each cluster and transmit information. On the other side, the MNS scheme can reduce the amount of channel information compared with the ONS scheme, while the MNS scheme still provides secure transmission. In addition, the impact of the network parameters on the secrecy performance is also insightfully discussed in this paper. Moreover, we evaluate the trade-off of the proposed schemes between secrecy performance and computational complexity.

15.
Sensors (Basel) ; 23(4)2023 Feb 07.
Artigo em Inglês | MEDLINE | ID: mdl-36850480

RESUMO

The goal of 6G is to make far-reaching changes in communication systems with stricter demands, such as high throughput, extremely low latency, stronger security, and ubiquitous connectivity. Several promising techniques, such as reconfigurable intelligent surfaces (RISs), have been introduced to achieve these goals. An RIS is a 2D low-cost array of reflecting elements that can adjust the electromagnetic properties of an incident signal. In this paper, we guarantee secrecy by using an irregular RIS (IRIS). The main idea of an IRIS is to irregularly activate reflecting elements for a given number of RIS elements. In this work, we consider a communication scenario in which, with the aid of an IRIS, a multi-antenna base station establishes a secure link with a legitimate single-antenna user in the presence of a single-antenna eavesdropper. To this end, we formulate a topology-and-precoding optimization problem to maximize the secrecy rate. We then propose a Tabu search-based algorithm to jointly optimize the RIS topology and the precoding design. Finally, we present simulation results to validate the proposed algorithm, which highlights the performance gain of the IRIS in improving secure transmissions compared to an RIS. Our results show that exploiting an IRIS can allow additional spatial diversity to be achieved, resulting in secrecy performance improvement and overcoming the limitations of conventional RIS-assisted systems (e.g., a large number of active elements).

16.
Sensors (Basel) ; 23(9)2023 Apr 28.
Artigo em Inglês | MEDLINE | ID: mdl-37177577

RESUMO

As a new technology for reconstructing communication environments, intelligent reflecting surfaces (IRSs) can be applied to UAV communication systems. However, some challenges exist in IRS-assisted UAV communication system design, such as physical layer security issues, IRS design, and power consumption issues owing to the limitation of the hardware. Therefore, a secrecy capacity optimization scheme for an active IRS-assisted unmanned aerial vehicle (UAV) communication system is proposed to solve multi-user security issues. In particular, controllable power amplifiers are integrated into reflecting units to solve the problem of blocked links, and the UAV can dynamically select the served user according to the channel quality. In order to maximize the system average achievable secrecy capacity and ensure the power constraints of the UAV and active IRS, user scheduling, UAV trajectory, beamforming vector, and reflection matrix are jointly optimized, and the block coordinate descent (BCD) algorithm is applied to solve this non-convex problem. Simulation results show that the active IRS-assisted UAV communication scheme can significantly weaken the "multiplicative fading" effect and enhance the system secrecy capacity by 55.4% and 11.9% compared with the schemes with passive IRS and without optimal trajectory, respectively.

17.
Sensors (Basel) ; 23(2)2023 Jan 08.
Artigo em Inglês | MEDLINE | ID: mdl-36679520

RESUMO

A secrecy energy efficiency optimization scheme for a multifunctional unmanned aerial vehicle (UAV) assisted mobile edge computing system is proposed to solve the computing power and security issues in the Internet-of-Things scenario. The UAV can switch roles between a computing UAV and jamming UAV based on the channel conditions. To ensure the security of the content and the system energy efficiency in the process of offloading computing tasks, the UAV trajectory, uplink transmit power, user scheduling, and offload task are jointly optimized, and an updated-rate assisted block coordinate descent (BCD) algorithm is used. Simulation results show that this scheme efficiently improves the secrecy performance and energy efficiency of the system. Compared with the benchmark scheme, the secrecy energy efficiency of the scheme is improved by 38.5%.


Assuntos
Conservação de Recursos Energéticos , Dispositivos Aéreos não Tripulados , Algoritmos , Benchmarking , Simulação por Computador
18.
Sensors (Basel) ; 23(5)2023 Mar 02.
Artigo em Inglês | MEDLINE | ID: mdl-36904928

RESUMO

Reconfigurable intelligent surfaces (RIS) are considered of paramount importance to improve air-ground and THz communications performance for 6G systems. Recently, RISs were proposed in Physical Layer Security (PLS), as they can (i) improve the secrecy capacity due to the controlled directional reflections' capability of RIS elements and (ii) avoid potential eavesdroppers, redirecting data streams towards the intended users. This paper proposes the integration of a multi-RISs system within a Software Defined Networking (SDN) architecture to provide a specific control layer for secure data flows forwarding. The optimisation problem is properly characterised in terms of an objective function and an equivalent graph theory model is considered to address the optimal solution. Moreover, different heuristics are proposed, trading off complexity and PLS performance, to evaluate the more suitable multi-beam routing strategy. Numerical results are also provided, focusing on a worst case scenario which points out the improvement of the secrecy rate from the increase in the number of eavesdroppers. Furthermore, the security performance is investigated for a specific user mobility pattern in a pedestrian scenario.

19.
Sensors (Basel) ; 23(3)2023 Jan 17.
Artigo em Inglês | MEDLINE | ID: mdl-36772106

RESUMO

Physical layer security is a promising technique to ensure the confidentiality of short-packet communications, since no additional channel uses are needed. Motivated by the fact of finite coding blocklength in short-packet communications, we attempt to investigate the problem of how many the channel uses utilized for channel training should be allocated to perform secure communications. Based on the finite blocklength information theory, we derive a closed-form expression to approximate the average achievable secrecy throughput. To gain more insights, we also present the asymptotic average secrecy throughput under two special cases, i.e., high signal-to-noise ratio (SNR) and infinite blocklength. Moreover, we determine the optimal channel training length to maximize the average secrecy throughput under the reliability constraint and given blocklength. Numerical results are provided to validate the analysis and demonstrate that the performance gain achieved by the optimal channel training length is remarkable, relative to other benchmark schemes.

20.
Sensors (Basel) ; 24(1)2023 Dec 27.
Artigo em Inglês | MEDLINE | ID: mdl-38203020

RESUMO

5G acts as a highway enabling innovative digital transformation and the Fourth Industrial Revolution in our lives. It is undeniable that the success of such a paradigm shift hinges on robust security measures. Foremost among these is primary authentication, the initial step in securing access to 5G network environments. For the 5G primary authentication, two protocols, namely 5G Authentication and Key Agreement (5G-AKA) and Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA'), were proposed and standardized, where the former is for 3GPP devices, and the latter is for non-3GPP devices. Recent scrutiny has unveiled vulnerabilities in the 5G-AKA protocol, exposing it to security breaches, including linkability attacks. Moreover, mobile communication technologies are dramatically evolving while 3GPP has standardized Authentication and Key Management for Applications (AKMA) to reuse the credentials, generated during primary authentication, for 5G network applications. That makes it so significant for 5G-AKA to be improved to support forward secrecy as well as address security attacks. In response, several protocols have been proposed to mitigate these security challenges. In particular, they tried to strengthen security by reusing secret keys negotiated through the Elliptic Curve Integrated Encryption Scheme (ECIES) and countering linkability attacks. However, they still have encountered limitations in completing forward secrecy. Motivated by this, we propose an augmentation to 5G-AKA to achieve forward security and thwart linkability attacks (called 5G-AKA-FS). In 5G-AKA-FS, the home network (HN), instead of using its static ECIES key pair, generates a new ephemeral key pair to facilitate robust session key negotiation, truly realizing forward security. In order to thoroughly and precisely prove that 5G-AKA-FS is secure, formal security verification is performed by applying both BAN Logic and ProVerif. As a result, it is demonstrated that 5G-AKA-FS is valid. Besides, our performance comparison highlights that the communication and computation overheads are intrinsic to 5G-AKA-FS. This comprehensive analysis showcases how the protocol effectively balances between security and efficiency.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA