GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications

被引:60
作者
Lai, Chengzhe [1 ,2 ]
Lu, Rongxing [3 ]
Zheng, Dong [1 ]
Li, Hui [2 ]
Shen, Xuemin [4 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[3] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[4] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
中国国家自然科学基金;
关键词
Machine to machine (M2M); Machine-type communications (MTC); Group authentication and key agreement; Security; Lightweight; The 3rd generation partnership project (3GPP); KEY AGREEMENT; SECURITY ANALYSIS; 3GPP; PROTOCOL; AKA;
D O I
10.1016/j.comnet.2016.02.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Supporting a massive number of machine to machine (M2M) devices has been considered as an essential requirement in M2M communications. Meanwhile, cyber security is of paramount importance in M2M; if M2M devices cannot securely access the networks through efficient authentication, all applications involving M2M cannot be widely accepted. One of research challenges in M2M is group authentication since a large number of M2M devices accessing the network simultaneously will cause a severe authentication signaling congestion. To solve this problem, as well as reduce authentication overhead of the previous schemes based on public key cryptosystems, we propose a novel lightweight group authentication scheme for resource-constrained M2M (GLARM) under the 3GPP network architecture, which consists of two protocols that can achieve efficient and secure group authentication in the 3GPP access case and non-3GPP access case, respectively. GLARM can not only authenticate all M2M devices simultaneously, but also minimize the authentication overhead. The security analysis shows that the proposed scheme can achieve the security goals, and prevent the various security threats. In addition, performance evaluation demonstrates its efficiency in terms of computation complexity and communication overhead. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:66 / 81
页数:16
相关论文
共 37 条
[1]   Interworking architecture between 3GPP and WLAN systems [J].
Ahmavaara, K ;
Haverinen, H ;
Pichna, R .
IEEE COMMUNICATIONS MAGAZINE, 2003, 41 (11) :74-81
[2]   Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers [J].
Al Shidhani, Ali ;
Leung, Victor C. M. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) :699-713
[3]  
[Anonymous], 2004, Proceedings of the 3rd ACM Workshop on Wireless Security
[4]  
[Anonymous], WHITE PAP MENTOR GRA
[5]  
[Anonymous], 2013, INT J DISTRIBUTED SE
[6]  
[Anonymous], P IEEE C COMP COMM I
[7]  
[Anonymous], 33402 3GPP TS
[8]  
[Anonymous], 33401 3GPP TS
[9]  
[Anonymous], 4187 RFC
[10]  
[Anonymous], CRYPTOLOGY