Author
Jari Arkko
Bio: Jari Arkko is an academic researcher from Ericsson. The author has contributed to research in topics: The Internet & Authentication. The author has an hindex of 34, co-authored 127 publications receiving 8921 citations.
Papers published on a yearly basis
Papers
More filters
01 Sep 2003
TL;DR: The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting framework for applications such as network access or IP mobility, and needs to be supported by all Diameter implementations.
Abstract: The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting (AAA) framework for applications such as network access or IP mobility. Diameter is also intended to work in both local Authentication, Authorization & Accounting and roaming situations. This document specifies the message format, transport, error reporting, accounting and security services to be used by all Diameter applications. The Diameter base application needs to be supported by all Diameter implementations.
1,087 citations
01 Jan 2006
TL;DR: This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Authentication and Key Agreement (AKA) mechanism used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and cdma2000.
Abstract: This document specifies an Extensible Authentication Protocol (EAP)
mechanism for authentication and session key distribution using the
Authentication and Key Agreement (AKA) mechanism used in the 3rd
generation mobile networks Universal Mobile Telecommunications System
(UMTS) and cdma2000. AKA is based on symmetric keys, and runs
typically in a Subscriber Identity Module (UMTS Subscriber Identity
Module USIM, or (Removable) User Identity Module (R)UIM), a smart card
like device. EAP-AKA includes optional identity privacy support,
optional result indications, and an optional fast re-authentication
procedure.
345 citations
01 Mar 2005
TL;DR: This document specifies security mechanisms for NDP, and unlike those in the original NDP specifications, these mechanisms do not use IPsec.
Abstract: IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other
nodes on the link, to determine their link-layer addresses to find
routers, and to maintain reachability information about the paths to
active neighbors. If not secured, NDP is vulnerable to various
attacks. This document specifies security mechanisms for NDP. Unlike
those in the original NDP specifications, these mechanisms do not use
IPsec. [STANDARDS-TRACK]
337 citations
01 Aug 2004
TL;DR: This document describes a key management scheme that can be used for real-time applications (both for peer-to-peer communication and group communication) and in particular, its use to support the Secure Real-time Transport Protocol is described in detail.
Abstract: This document describes a key management scheme that can be used for
real-time applications (both for peer-to-peer communication and group
communication) In particular, its use to support the Secure Real-time
Transport Protocol is described in detail Security protocols for
real-time multimedia applications have started to appear This has
brought forward the need for a key management solution to support
these protocols [STANDARDS-TRACK]
252 citations
Cited by
More filters
•
28,685 citations
••
TL;DR: It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.
1,743 citations
01 Jan 2005
TL;DR: This document describes the NEMO Basic Support protocol, which is an extension of Mobile IPv6 and allows session continuity for every node in the Mobile Network as the network moves, and is designed so that network mobility is transparent to the nodes inside the Mobile network.
Abstract: This document describes the Network Mobility (NEMO) Basic Support
protocol that enables Mobile Networks to attach to different points in
the Internet. The protocol is an extension of Mobile IPv6 and allows
session continuity for every node in the Mobile Network as the network
moves. It also allows every node in the Mobile Network to be reachable
while moving around. The Mobile Router, which connects the network to
the Internet, runs the NEMO Basic Support protocol with its Home
Agent. The protocol is designed so that network mobility is
transparent to the nodes inside the Mobile Network. [STANDARDS-TRACK]
1,166 citations
••
TL;DR: The main principles behind blockchain technology are expounded and the core concepts at the heart of the blockchain are presented, and the main features of decentralized public ledger platforms are exposed.
Abstract: This paper expounds the main principles behind blockchain technology and some of its cutting-edge applications. Firstly, we present the core concepts at the heart of the blockchain, and we discuss the potential risks and drawbacks of public distributed ledgers, and the shift toward hybrid solutions. Secondly, we expose the main features of decentralized public ledger platforms. Thirdly, we show why the blockchain is a disruptive and foundational technology, and fourthly, we sketch out a list of important applications, bearing in mind the most recent evolutions.
1,009 citations
••
TL;DR: This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues and analyzes the open challenges and strategies for future research work in the area.
Abstract: The Internet of Things (IoT) introduces a vision of a future Internet where users, computing systems, and everyday objects possessing sensing and actuating capabilities cooperate with unprecedented convenience and economical benefits. As with the current Internet architecture, IP-based communication protocols will play a key role in enabling the ubiquitous connectivity of devices in the context of IoT applications. Such communication technologies are being developed in line with the constraints of the sensing platforms likely to be employed by IoT applications, forming a communications stack able to provide the required power—efficiency, reliability, and Internet connectivity. As security will be a fundamental enabling factor of most IoT applications, mechanisms must also be designed to protect communications enabled by such technologies. This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues. We analyze how existing approaches ensure fundamental security requirements and protect communications on the IoT, together with the open challenges and strategies for future research work in the area. This is, as far as our knowledge goes, the first survey with such goals.
968 citations