2017 IEEE International Conference on Communications (ICC) 2017
DOI: 10.1109/icc.2017.7997466
|View full text |Cite
|
Sign up to set email alerts
|

Massive machine-type communication (mMTC) access with integrated authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 9 publications
0
16
0
Order By: Relevance
“…Short payloads and latency constraints of MTC traffic, and the limited computational capabilities of the devices, demand more scalable solutions for authentication processes. Lightweight and flexible solutions like group-based authentication schemes, anonymous serviceoriented authentication strategies to manage a large number of authentication requests [10], lightweight physicallayer authentication, and the integration of authentication with access protocols [11] represent promising solutions that are likely to be adopted in 6G.…”
Section: Efficient and Low-cost Authentication And Authorizationmentioning
confidence: 99%
“…Short payloads and latency constraints of MTC traffic, and the limited computational capabilities of the devices, demand more scalable solutions for authentication processes. Lightweight and flexible solutions like group-based authentication schemes, anonymous serviceoriented authentication strategies to manage a large number of authentication requests [10], lightweight physicallayer authentication, and the integration of authentication with access protocols [11] represent promising solutions that are likely to be adopted in 6G.…”
Section: Efficient and Low-cost Authentication And Authorizationmentioning
confidence: 99%
“…5G enables IoT to have higher transmission speed and capacity and lower transmission delay and can provide high coverage and massive device deployment for the Internet of ings applications [2,3]. ese massively connected terminal devices simultaneously initiate authentication requests, which will have a serious impact on the authentication server [9][10][11]. In traditional authentication mechanisms, a centralized mechanism is usually used, as in Figure 1(a), where all devices are authenticated through a centrally located authentication server.…”
Section: Motivation and Basicmentioning
confidence: 99%
“…Traditional authentication schemes are usually centralized, which has high latency and untimely response problems in the 5G mass IoT device access scenario [6]. On the one hand, the authentication server or network node will have serious network congestion when massive IoT devices ask for authentication in this era where IoT devices are ubiquitous, and this will seriously affect the service quality of IoT applications [7][8][9][10][11]. On the other hand, centralized authentication usually requires the authentication center to respond to the authentication request of the IoT device.…”
Section: Introductionmentioning
confidence: 99%
“…Communication nodes have characteristics of a dense distribution, high concurrent communication, low communication delay, and dynamic migration. The network will be confronted with many problems, such as the real-time generation and management of key distribution between massive communication nodes, which also brings new challenges to providing security for traditional wireless communications [23][24][25][26].…”
Section: Security Requirements Of New Business Applicationsmentioning
confidence: 99%