2012
DOI: 10.3837/tiis.2012.02.003
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues on Machine to Machine Communications

Abstract: Machine to machine (M2M) communications is the hottest issue in the standardization and industry area, it is also defined as machine-type communication (MTC) in release 10 of the 3rd Generation Partnership Project (3GPP). Recently, most research have focused on congestion control, sensing, computing, and controlling technologies and resource management etc., but there are few studies on security aspects. In this paper, we first introduce the threats that exist in M2M system and corresponding solutions accordin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…These schemes will suffer from high network access delay and signaling overhead in group communications, since each device must perform a full authentication procedure with the home authentication server, respectively. Therefore, designing a secure and efficient group access authentication scheme for MTC devices during roaming is desirable [14], [15]. Recently, Fun et al [16] propose a novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks.…”
Section: Introductionmentioning
confidence: 99%
“…These schemes will suffer from high network access delay and signaling overhead in group communications, since each device must perform a full authentication procedure with the home authentication server, respectively. Therefore, designing a secure and efficient group access authentication scheme for MTC devices during roaming is desirable [14], [15]. Recently, Fun et al [16] propose a novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks.…”
Section: Introductionmentioning
confidence: 99%
“…In this section, we focus on building more secure M2M communications in LTE networks by discussing several new security issues and presenting some solutions in all areas domain of the M2M architecture. The main contributions in this part are three-fields [9]:…”
Section: Several New Security Issues and Existing Solutionsmentioning
confidence: 99%
“…The main idea is the following: first, a leader MTC device is selected from a group, and a full authentication AKA procedure is performed. In this process, the leader MTC device obtains a group of authentication vectors and group authentication key (GAK) on behalf of other MTC Group devices [18].…”
Section: Group Authentication Proceduresmentioning
confidence: 99%