2017
DOI: 10.1007/s11277-017-5005-6
|View full text |Cite
|
Sign up to set email alerts
|

DGBES: Dynamic Group Based Efficient and Secure Authentication and Key Agreement Protocol for MTC in LTE/LTE-A Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…Many researches have been carried out to analyze or/and address this weakness by improving or modifying AKA protocol. Gupta et al [10] proposed a dynamic group based efficient and secure (DGBES-AKA) protocol for M2M communication in LTE/LTE-A network, which improved some overhead. Li et al [11] proposed the group-based AKA (GR-AKA) protocol which not only could authenticate several communication devices simultaneously, but also made the system to dynamically update its access-policy in an efficient way.…”
Section: B Related Workmentioning
confidence: 99%
“…Many researches have been carried out to analyze or/and address this weakness by improving or modifying AKA protocol. Gupta et al [10] proposed a dynamic group based efficient and secure (DGBES-AKA) protocol for M2M communication in LTE/LTE-A network, which improved some overhead. Li et al [11] proposed the group-based AKA (GR-AKA) protocol which not only could authenticate several communication devices simultaneously, but also made the system to dynamically update its access-policy in an efficient way.…”
Section: B Related Workmentioning
confidence: 99%
“…The scheme of Gupta et al 14 proposes a dynamic group authentication and key agreement protocol for MTC in LTE/LTE-A (group-based secure authentication and key agreement (GBS-AKA)), based on symmetric cryptography composed of four phases. The group organization is based on binary tree and a group leader is elected.…”
Section: Related Workmentioning
confidence: 99%
“…Fu et al 12 Lai et al 13 Gupta et al 14 Parne et al 15 MTC group without the presence of a managing entity, as HSS. Table 2 shows the main entities involved in the architecture of the protocol and the notations and corresponding definitions are provided in Table 3.…”
Section: Proposed Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…At the same time, lots of group key establishment protocols based on public key cryptography methods have been presented. However, most of these protocols [17][18][19][20][21] are the same as the above two protocols [15,16], only one key can be generated at a time for a single group.…”
Section: Introductionmentioning
confidence: 99%