Cluster-based authentication for machine type communication in LTE network using elliptic curve cryptography

被引:0
作者
Jyothi K.K. [1 ,2 ]
Chaudhari S. [3 ]
机构
[1] School of Computing and Information Technology, Reva University, Bangalore
[2] Department of Cse, Snist, Hyderabad
[3] Department of Cse, M.S. Ramaiah Institute of Technology, Bangalore
关键词
Authentication; Grey wolf algorithm; Jaya algorithm; LTE network; Machine type communication; MTC;
D O I
10.1504/IJCC.2020.109380
中图分类号
学科分类号
摘要
Machine type communication (MTC) is a significant approach for communication in the long-term evaluation (LTE) networks. This paper intends to introduce a new cluster-based authentication model for MTC in the LTE network. At first, the nodes in LTE network are subjected under the clustering process via k-means approach. However, for the selection of optimal cluster head this paper establishes a novel hybrid approach termed as wolf insisted Jaya algorithm (WI-JA) that hybrid the concept of both Jaya algorithm (JA) and grey wolf optimisation (GWO) algorithms. As a novelty, in this work, all the selected cluster head involves the records of all the remaining nodes exists in network, and this will be handled via block chain technology. Finally, in the authentication phase, authenticate to the chosen cluster head via elliptic curve cryptography (ECC). The performance of the presented framework was evaluated and proved over other conventional models with respect to certain measures. © 2020 Inderscience Enterprises Ltd.. All rights reserved.
引用
收藏
页码:258 / 284
页数:26
相关论文
共 36 条
[1]  
Amodu O.A., Othman M., Machine-to-machine communication: an overview of opportunities, Computer Networks, 145, pp. 255-276, (2018)
[2]  
Andrade T.P.C., Astudillo C.A., Fonseca N.L.S., Allocation of control resources for machine-to-machine and human-to-human communications over LTE/LTE-A networks, IEEE Internet of Things Journal, 3, 3, pp. 366-377, (2016)
[3]  
Baidya R.G.R.D., Speed control of DC motor using fuzzy-based intelligent model reference adaptive control scheme, Advances in Communication, Devices and Networking, 462, pp. 729-735, (2017)
[4]  
Basu M., Group search optimization for economic fuel scheduling, International Journal of Electrical Power & Energy Systems, 64, pp. 894-901, (2015)
[5]  
Bukhari J.F., Park J-H., Yoon W., Providing multicast services over SDN-evolved LTE network: architecture, procedures and performance analysis, Computer Communications, 127, pp. 131-145, (2018)
[6]  
Buterin V., A Next-generation Smart Contract and Decentralized Application Platform, 2014, pp. 1-36, (2015)
[7]  
Choi D.C-K., Lee S-Y., A group-based security protocol for machine-type communications in LTE-advanced, Wireless Networks, 21, 2, pp. 405-419, (2015)
[8]  
Chuen D.L.K., Handbook of Digital Currency, (2015)
[9]  
Deaton J.D., Irwin R.E., Silva L.A.D., Dynamic spectrum access in LTE-advanced networks, Physical Communication, 10, pp. 127-143, (2014)
[10]  
Deshpande K.V., Rajesh A., Investigation on IMCP based clustering in LTE-M communication for smart metering applications, Engineering Science and Technology, an International Journal, 20, 3, pp. 944-955, (2017)