Skip to main content

Table 1 Notations table

From: 5G wireless P2MP backhaul security protocol: an adaptive approach

Notation

Meaning

TM

Terminal

HUB

HUB

ASF

Authentication Server Function

IDX

X’s identifier

Capability

List of the possible cryptographic algorithms, authentication and key exchange methods, etc.

Policy

The adaptively selected cryptographic algorithms, authentication and key exchange method, key size, key lifetime, etc. to secure the 5G backhaul system

PMK

Pre-master key

MK

Master key

AK

Authentication Key

CK

Cipher key

CM

AES128-CMAC

nx

xth nonce

ts

Time stamp

Kold

Secret key generated in previous session

||

Concatenation

[]

Optional parameter

p, g

p is a pre-configured public modulus (prime) and g is a pre-configured public base for Diffie-Hellman key exchange

PFS

Perfect Forward Secrecy

KX-Y

Shared secret key between X and Y.