2020
DOI: 10.1109/jiot.2020.2976740
|View full text |Cite
|
Sign up to set email alerts
|

LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
34
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(34 citation statements)
references
References 25 publications
0
34
0
Order By: Relevance
“…Formal Verification with Scyther Tool. Here, we use the Scyther tool to verify our protocol, which is a formal verification tool for security protocols [52]. There are many models in the Scyther, such as standard Dolev-Yao model, CK model, and eCK model.…”
Section: Security Evaluationmentioning
confidence: 99%
“…Formal Verification with Scyther Tool. Here, we use the Scyther tool to verify our protocol, which is a formal verification tool for security protocols [52]. There are many models in the Scyther, such as standard Dolev-Yao model, CK model, and eCK model.…”
Section: Security Evaluationmentioning
confidence: 99%
“…The AMF/SEAF can initiate communication with the AUSF when an MD or UE connects to the SN over the NG-RAN. This communication helps get the associated authentication vectors to aid mutual authentication with the MD or UE [17]. When the MD or UE connects to the SN via the non-3GPP AN, the MD or UE and the N3IWF housed in the SN use the Internet Key Exchange Protocol version 2 to establish the desirable security [17], [63].…”
Section: Basic Setting On Massive Devices In 5g Wireless Sensor Networkmentioning
confidence: 99%
“…This communication helps get the associated authentication vectors to aid mutual authentication with the MD or UE [17]. When the MD or UE connects to the SN via the non-3GPP AN, the MD or UE and the N3IWF housed in the SN use the Internet Key Exchange Protocol version 2 to establish the desirable security [17], [63]. In this case, the authentication server function (AUSF)/SEAF establishes connections with the AUSF and enables the EAP-5G protocol to achieve mutual authentication with the MD or UE.…”
Section: Basic Setting On Massive Devices In 5g Wireless Sensor Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…e rapid developments of big data, Internet of ings (IoT), and the fifth-generation mobile communication (5G) technologies promote an explosion growth in data volumes generated by users' mobile devices, which also result in the widespread popularity and further upgrading of 5G cloud storage services in cloud service provider (CSP) [1][2][3]. CSP provides users with massive data storage services without requiring the users to store data in local devices [4], which not only saves users' a large amount of money for building their own storage, but also can search and retrieve the required data more quickly and share the data with other users more expediently, such as Dropbox, Baidu Cloud, and Alibaba Cloud [5][6][7].…”
Section: Introductionmentioning
confidence: 99%