2020
DOI: 10.23919/jcin.2020.9306019
|View full text |Cite
|
Sign up to set email alerts
|

LEGA: A Lightweight and Efficient Group Authentication Protocol for Massive Machine Type Communication in 5G Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…While handover operations are carried out, the study further considers key management as an essential part of the operation to authenticate the data from IoT devices in a secured manner. To do this, we use an intra-3GPP [28][29][30][31][32] by shifting the UE between gNBs with five different entities that include the following: UE…”
Section: Handover and Key Managementmentioning
confidence: 99%
“…While handover operations are carried out, the study further considers key management as an essential part of the operation to authenticate the data from IoT devices in a secured manner. To do this, we use an intra-3GPP [28][29][30][31][32] by shifting the UE between gNBs with five different entities that include the following: UE…”
Section: Handover and Key Managementmentioning
confidence: 99%
“…Basudan [12] proposed a lightweight and efficient mMTC group authentication protocol in 5G networks. The protocol was based on bilinear mapping and aggregation without certificates and realized mutual authentication, session keys, and confidentiality.…”
Section: Related Workmentioning
confidence: 99%
“…Based on research [11][12][13][14][15][16][17][18][19][20][21][22][23], this paper proposes a lightweight security authentication scheme. This solution enables the mMTC devices to communicate securely through the session key in the 5G networks.…”
Section: Proposed Schemementioning
confidence: 99%
See 1 more Smart Citation
“…Achieving forward secrecy in secure communication schemes was introduced in Sun et al (2005), Brown et al (2001), Basudan (2020), Basudan et al (2017), Alamer (2020). However, a top-notch network infrastructure is needed to regulate fresh key material to users.…”
Section: Related Workmentioning
confidence: 99%