End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture

被引:8
|
作者
Zhang, Wujun [1 ]
Zhang, Yueyu [1 ]
Chen, Jie [1 ]
Li, Hui [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2013年 / 16卷 / 04期
关键词
Machine-Type Communication; End-to-end security; Generic Authentication Architecture; Authentication and key agreement;
D O I
10.1007/s10586-013-0259-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Type Communication (MTC) and its related services have become the new business growth-point of mobile communication. However, application market with the size of about a hundred of million makes end-to-end security facing grand challenges, especially the repeated construction of authentication facilities for different applications. According to features of MTC, an end-to-end security scheme is proposed, which is based on the Generic Authentication Architecture (GAA), and is thus suitable for MTC communication in application layer. User authentication and session key agreement are achieved by the assistance of operator network in this scheme. Hence, the MTC server can only focus on service delivery. Performance of the proposal is also analyzed, and from this procedure, we obtain the function of lifetime of master session key against expected number of bootstrapping request. Finally, it is shown how the operator could set an optimized lifetime of master session key.
引用
收藏
页码:861 / 871
页数:11
相关论文
共 50 条
  • [1] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Wujun Zhang
    Yueyu Zhang
    Jie Chen
    Hui Li
    Yumin Wang
    Cluster Computing, 2013, 16 : 861 - 871
  • [2] The end of end-to-end security?
    Bradner, S
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [3] End-to-end security scheme for mobility enabled healthcare Internet of Things
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Nigussie, Ethiopia
    Rahmani, Amir M.
    Virtanen, Seppo
    Tenhunen, Hannu
    Isoaho, Jouni
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 64 : 108 - 124
  • [4] End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC
    Moosavi, Sanaz Rahimi
    Izadifar, Arman
    SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2021, 2022, 1536 : 77 - 89
  • [5] Synthesising End-to-End Security Protocols
    Thevathayan, Charles
    Bertok, Peter
    Fernandez, George
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
  • [6] Research on End-to-End Security Authentication Protocol of NB-IoT for Smart Grid Based on Physical Unclonable Function
    Liu, Donglan
    Liu, Xin
    Zhang, Hao
    Yu, Hao
    Wang, Wenting
    Ma, Lei
    Chen, Jianfei
    Li, Dong
    2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 239 - 244
  • [7] Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
    Dahlmanns, Markus
    Pennekamp, Jan
    Fink, Ina Berenice
    Schoolmann, Bernd
    Wehrle, Klaus
    Henze, Martin
    SAT-CPS'21: PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2021, : 78 - 87
  • [8] A Secure End-to-End Mobile Chat Scheme
    Chen , Hsing-Chung
    Wen, Jyh-Horng
    Yang, Cheng-Ying
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 472 - 477
  • [9] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [10] An efficient identity-based cryptosystem for end-to-end mobile security
    Hwu, Jing-Shyang
    Chen, Rong-Jaye
    Lin, Yi-Bing
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (09) : 2586 - 2593