End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture

被引:8
|
作者
Zhang, Wujun [1 ]
Zhang, Yueyu [1 ]
Chen, Jie [1 ]
Li, Hui [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2013年 / 16卷 / 04期
关键词
Machine-Type Communication; End-to-end security; Generic Authentication Architecture; Authentication and key agreement;
D O I
10.1007/s10586-013-0259-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Type Communication (MTC) and its related services have become the new business growth-point of mobile communication. However, application market with the size of about a hundred of million makes end-to-end security facing grand challenges, especially the repeated construction of authentication facilities for different applications. According to features of MTC, an end-to-end security scheme is proposed, which is based on the Generic Authentication Architecture (GAA), and is thus suitable for MTC communication in application layer. User authentication and session key agreement are achieved by the assistance of operator network in this scheme. Hence, the MTC server can only focus on service delivery. Performance of the proposal is also analyzed, and from this procedure, we obtain the function of lifetime of master session key against expected number of bootstrapping request. Finally, it is shown how the operator could set an optimized lifetime of master session key.
引用
收藏
页码:861 / 871
页数:11
相关论文
共 50 条
  • [11] Group Anonymous D2D Communication with End-to-End Security in LTE-A
    Hsu, Ruei-Hau
    Lee, Jemin
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 451 - 459
  • [12] MADTLS: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
    Wagner, Eric
    Heye, David
    Serror, Martin
    Kunze, Ike
    Wehrle, Klaus
    Henze, Martin
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 972 - 986
  • [13] A PK-SIM card based end-to-end security framework for SMS
    He Rongyu
    Zhao Guolei
    Chang Chaowen
    Me Hui
    Qin Xi
    Qin Zheng
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 629 - 641
  • [14] Scalable end-to-end security for advanced metering infrastructures
    Nabeel, Mohamed
    Ding, Xiaoyu
    Seo, Seung-Hyun
    Bertino, Elisa
    INFORMATION SYSTEMS, 2015, 53 : 213 - 223
  • [15] Establishing End-to-End Security in a Nationwide Network for Telecooperation
    Staemmler, Martin
    Walz, Michael
    Weisser, Gerald
    Engelmann, Uwe
    Weininger, Robert
    Ernstberger, Antonio
    Sturm, Johannes
    QUALITY OF LIFE THROUGH QUALITY OF INFORMATION, 2012, 180 : 512 - 516
  • [16] End-to-End Security for At-Home Medical Monitoring
    Subramanian, Mohanavalli Seetha
    Anand, Sheila
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 483 - +
  • [17] IoTSM: An End-to-end Security Model for IoT Ecosystems
    Bugeja, Joseph
    Vogel, Bahtijar
    Jacobsson, Andreas
    Varshney, Rimpu
    2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 267 - 272
  • [18] A Network Assisted End-to-End Security Protocol for Mobile Applications
    He, Lisha
    Zhang, Ning
    He, Lirong
    Rogers, Ian
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 159 - 165
  • [19] An efficient end-to-end security mechanism for IP multimedia subsystem
    Chen, Chi-Yuan
    Wu, Tin-Yu
    Huang, Yueh-Min
    Chao, Han-Chieh
    COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4259 - 4268
  • [20] Performance Analysis of End-to-End Security Schemes in Healthcare IoT
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Levorato, Marco
    Virtanen, Seppo
    Isoaho, Jouni
    9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 432 - 439