scispace - formally typeset
Search or ask a question
Author

Jari Arkko

Bio: Jari Arkko is an academic researcher from Ericsson. The author has contributed to research in topics: The Internet & Authentication. The author has an hindex of 34, co-authored 127 publications receiving 8921 citations.


Papers
More filters
01 Sep 2003
TL;DR: The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting framework for applications such as network access or IP mobility, and needs to be supported by all Diameter implementations.
Abstract: The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting (AAA) framework for applications such as network access or IP mobility. Diameter is also intended to work in both local Authentication, Authorization & Accounting and roaming situations. This document specifies the message format, transport, error reporting, accounting and security services to be used by all Diameter applications. The Diameter base application needs to be supported by all Diameter implementations.

1,087 citations

01 Jan 2006
TL;DR: This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Authentication and Key Agreement (AKA) mechanism used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and cdma2000.
Abstract: This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Authentication and Key Agreement (AKA) mechanism used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and cdma2000. AKA is based on symmetric keys, and runs typically in a Subscriber Identity Module (UMTS Subscriber Identity Module USIM, or (Removable) User Identity Module (R)UIM), a smart card like device. EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure.

345 citations

01 Mar 2005
TL;DR: This document specifies security mechanisms for NDP, and unlike those in the original NDP specifications, these mechanisms do not use IPsec.
Abstract: IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors. If not secured, NDP is vulnerable to various attacks. This document specifies security mechanisms for NDP. Unlike those in the original NDP specifications, these mechanisms do not use IPsec. [STANDARDS-TRACK]

337 citations

01 Aug 2004
TL;DR: This document describes a key management scheme that can be used for real-time applications (both for peer-to-peer communication and group communication) and in particular, its use to support the Secure Real-time Transport Protocol is described in detail.
Abstract: This document describes a key management scheme that can be used for real-time applications (both for peer-to-peer communication and group communication) In particular, its use to support the Secure Real-time Transport Protocol is described in detail Security protocols for real-time multimedia applications have started to appear This has brought forward the need for a key management solution to support these protocols [STANDARDS-TRACK]

252 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.

1,743 citations

01 Jan 2005
TL;DR: This document describes the NEMO Basic Support protocol, which is an extension of Mobile IPv6 and allows session continuity for every node in the Mobile Network as the network moves, and is designed so that network mobility is transparent to the nodes inside the Mobile network.
Abstract: This document describes the Network Mobility (NEMO) Basic Support protocol that enables Mobile Networks to attach to different points in the Internet. The protocol is an extension of Mobile IPv6 and allows session continuity for every node in the Mobile Network as the network moves. It also allows every node in the Mobile Network to be reachable while moving around. The Mobile Router, which connects the network to the Internet, runs the NEMO Basic Support protocol with its Home Agent. The protocol is designed so that network mobility is transparent to the nodes inside the Mobile Network. [STANDARDS-TRACK]

1,166 citations

OtherDOI
TL;DR: The main principles behind blockchain technology are expounded and the core concepts at the heart of the blockchain are presented, and the main features of decentralized public ledger platforms are exposed.
Abstract: This paper expounds the main principles behind blockchain technology and some of its cutting-edge applications. Firstly, we present the core concepts at the heart of the blockchain, and we discuss the potential risks and drawbacks of public distributed ledgers, and the shift toward hybrid solutions. Secondly, we expose the main features of decentralized public ledger platforms. Thirdly, we show why the blockchain is a disruptive and foundational technology, and fourthly, we sketch out a list of important applications, bearing in mind the most recent evolutions.

1,009 citations

Journal ArticleDOI
TL;DR: This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues and analyzes the open challenges and strategies for future research work in the area.
Abstract: The Internet of Things (IoT) introduces a vision of a future Internet where users, computing systems, and everyday objects possessing sensing and actuating capabilities cooperate with unprecedented convenience and economical benefits. As with the current Internet architecture, IP-based communication protocols will play a key role in enabling the ubiquitous connectivity of devices in the context of IoT applications. Such communication technologies are being developed in line with the constraints of the sensing platforms likely to be employed by IoT applications, forming a communications stack able to provide the required power—efficiency, reliability, and Internet connectivity. As security will be a fundamental enabling factor of most IoT applications, mechanisms must also be designed to protect communications enabled by such technologies. This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues. We analyze how existing approaches ensure fundamental security requirements and protect communications on the IoT, together with the open challenges and strategies for future research work in the area. This is, as far as our knowledge goes, the first survey with such goals.

968 citations