From: 5G wireless P2MP backhaul security protocol: an adaptive approach
Notation | Meaning |
---|---|
TM | Terminal |
HUB | HUB |
ASF | Authentication Server Function |
IDX | X’s identifier |
Capability | List of the possible cryptographic algorithms, authentication and key exchange methods, etc. |
Policy | The adaptively selected cryptographic algorithms, authentication and key exchange method, key size, key lifetime, etc. to secure the 5G backhaul system |
PMK | Pre-master key |
MK | Master key |
AK | Authentication Key |
CK | Cipher key |
CM | AES128-CMAC |
nx | xth nonce |
ts | Time stamp |
Kold | Secret key generated in previous session |
|| | Concatenation |
[] | Optional parameter |
p, g | p is a pre-configured public modulus (prime) and g is a pre-configured public base for Diffie-Hellman key exchange |
PFS | Perfect Forward Secrecy |
KX-Y | Shared secret key between X and Y. |