Alternative Security Options in the 5G and IoT Era

  • Schinianakis D.

This article attempts to provide a set of new directions and ideas for research in the ever vibrant fields of telecom and IoT security. It attempts by no means to present a complete set of security solutions; this would be by definition impossible. It rather serves as a short but comprehensive introduction to various technologies and cryptographic techniques in the area of lightweight cryptography in our quest to address the security challenges in the IoT and 5G-connectivity era. We use the term lightweight cryptography interchangeably both for symmetric and suitable asymmetric ciphers, thus covering all aspects of traditional cryptography namely encryption/decryption, authentication, identification, nonrepudiation, integrity protection, and key exchange. Possible usecases that challenge the applicability of lightweight cryptography as well future projections for further discussions are also offered.

View Original Article

Recent Publications

January 01, 2019

Friendly, appealing or both? Characterising user experience in sponsored search landing pages

  • Bron M.
  • Chute M.
  • Evans H.
  • Lalmas M.
  • Redi M.
  • Silvestri F.

© 2017 International World Wide Web Conference Committee (IW3C2), published under Creative Commons CC BY 4.0 License. Many of today's websites have recognised the importance of mobile friendly pages to keep users engaged and to provide a satisfying user experience. However, next to the experience provided by the sites themselves, ...

January 01, 2019

Analyzing uber's ride-sharing economy

  • Aiello L.
  • Djuric N.
  • Grbovic M.
  • Kooti F.
  • Lerman K.
  • Radosavljevic V.

© 2017 International World Wide Web Conference Committee (IW3C2), published under Creative Commons CC BY 4.0 License. Uber is a popular ride-sharing application that matches people who need a ride (or riders) with drivers who are willing to provide it using their personal vehicles. Despite its growing popularity, there exist ...

January 01, 2019

The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race

  • Cresci S.
  • Petrocchi M.
  • Pietro R.
  • Spognardi A.
  • Tesconi M.

© 2017 International World Wide Web Conference Committee (IW3C2), published under Creative Commons CC BY 4.0 License. Recent studies in social media spam and automation provide anecdotal argumentation of the rise of a new generation of spambots, so-called social spambots. Here, for the first time, we extensively study this novel ...