2013
DOI: 10.1002/ett.2635
|View full text |Cite
|
Sign up to set email alerts
|

A novel group access authentication and key agreement protocol for machine‐type communication

Abstract: Machine‐to‐machine communications have been actively engaged in by the standardisation and industry areas, also defined as machine‐type communication (MTC) in the release 10 of the 3rd Generation Partnership Project. The scenarios of 3rd Generation Partnership Project have been regarded as the promising solution facilitating machine‐to‐machine communications, which is being standardised as an emphatic application to be supported by long‐term evolution advanced. In this paper, we propose a novel group access au… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
7
1

Relationship

5
3

Authors

Journals

citations
Cited by 59 publications
(43 citation statements)
references
References 23 publications
0
41
0
Order By: Relevance
“…Note that we can not only employ the standard EPS AKA process [18], but also implement the group-based access authentication processes proposed in [11], [12], [13], [14], [15] to achieve the initial access authentication between the MTC handover group and the MME. Whatever anyone happens, after the successful access authentication, each M T CD i and the HSS can generate a shared secret key K ASM Ei , and then the HSS transmits the K ASM Ei to the MME.…”
Section: A Initial Authentication Phasementioning
confidence: 99%
See 1 more Smart Citation
“…Note that we can not only employ the standard EPS AKA process [18], but also implement the group-based access authentication processes proposed in [11], [12], [13], [14], [15] to achieve the initial access authentication between the MTC handover group and the MME. Whatever anyone happens, after the successful access authentication, each M T CD i and the HSS can generate a shared secret key K ASM Ei , and then the HSS transmits the K ASM Ei to the MME.…”
Section: A Initial Authentication Phasementioning
confidence: 99%
“…However, it is only applied to the communications between MTCDs and the MTC server without consideration of handover security in the current 3GPP standard. Subsequently, a lot of group-based access authentication methods in LTE networks have been presented in [11], [12], [13], [14], [15]. By the use of the grouping mechanism, these schemes can largely reduce the communication cost in the access authentication process.…”
Section: Introductionmentioning
confidence: 99%
“…The SC-based secure roaming schemes, e.g., EAP-based authentication and key agreement protocols [5], [27], [28], [29], [30], [31], are designed based on standard protocols [32], [33]. SC-based schemes are widely accepted because they are compatible with standard protocols.…”
Section: Related Workmentioning
confidence: 99%
“…Secure routing protocols [1][2][3] have been developed to protect WSN. However, these solutions utilize cryptography and authentication primitives which are not suitable for WSN to counter nodes' misbehavior attacks as these techniques assume the participating nodes to be cooperative and trustworthy.…”
Section: Introductionmentioning
confidence: 99%