2013 IEEE Global Communications Conference (GLOBECOM) 2013
DOI: 10.1109/glocom.2013.6831176
|View full text |Cite
|
Sign up to set email alerts
|

LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 9 publications
0
19
0
Order By: Relevance
“…The four authentication protocols in [64,78,80,157] use the idea of mutual authentication. The two authentication protocols [41] and [40] use the idea of authentication acknowledge phase. With the protocol [151], all packets are fully encrypted with the receiver's public key, which can prevent the MITM attack.…”
Section: Man-in-the-middle Attackmentioning
confidence: 99%
See 4 more Smart Citations
“…The four authentication protocols in [64,78,80,157] use the idea of mutual authentication. The two authentication protocols [41] and [40] use the idea of authentication acknowledge phase. With the protocol [151], all packets are fully encrypted with the receiver's public key, which can prevent the MITM attack.…”
Section: Man-in-the-middle Attackmentioning
confidence: 99%
“…These authentication protocols use three ideas, namely, Timestamp, Hash function, and Random numbers. The idea of random numbers is used by [41,56,40], and [42]. The idea of hash function is used by protocols [52] and [155], such as the IPSec protocol implements an anti-replay mechanism based on Message Authentication Code (MAC) [167].…”
Section: Replay Attackmentioning
confidence: 99%
See 3 more Smart Citations