End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture

被引:8
|
作者
Zhang, Wujun [1 ]
Zhang, Yueyu [1 ]
Chen, Jie [1 ]
Li, Hui [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2013年 / 16卷 / 04期
关键词
Machine-Type Communication; End-to-end security; Generic Authentication Architecture; Authentication and key agreement;
D O I
10.1007/s10586-013-0259-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Type Communication (MTC) and its related services have become the new business growth-point of mobile communication. However, application market with the size of about a hundred of million makes end-to-end security facing grand challenges, especially the repeated construction of authentication facilities for different applications. According to features of MTC, an end-to-end security scheme is proposed, which is based on the Generic Authentication Architecture (GAA), and is thus suitable for MTC communication in application layer. User authentication and session key agreement are achieved by the assistance of operator network in this scheme. Hence, the MTC server can only focus on service delivery. Performance of the proposal is also analyzed, and from this procedure, we obtain the function of lifetime of master session key against expected number of bootstrapping request. Finally, it is shown how the operator could set an optimized lifetime of master session key.
引用
收藏
页码:861 / 871
页数:11
相关论文
共 50 条
  • [21] Decentralized security framework for future IoT end-to-end connectivity
    Xin, Qin
    Gonzalez Crespo, Ruben
    Enrique Montenegro-Marin, Carlos
    Garcia Diaz, Vicente
    Alazab, Mamoun
    ANNALS OF OPERATIONS RESEARCH, 2023, 326 (SUPPL 1) : 79 - 79
  • [22] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) : 603 - 604
  • [23] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
  • [24] An end-to-end QoS and security joint management for IPTV service delivery
    Chalouf, M.A. (chalouf@labri.fr), 1600, Inderscience Enterprises Ltd. (05): : 398 - 416
  • [25] Secure IoT framework and 2D architecture for End-To-End security (vol 74, pg 3521, 2018)
    Choi, Jongseok
    In, Youngjin
    Park, Changjun
    Seok, Seonhee
    Seo, Hwajeong
    Kim, Howon
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (08) : 3536 - 3536
  • [26] Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things
    Sahraoui, Somia
    Bilami, Azeddine
    COMPUTER NETWORKS, 2015, 91 : 26 - 45
  • [27] END-TO-END SECURITY: AN APPROACH TO A NATIONAL NETWORK FOR TELE-COOPERATION
    Staemmler, M.
    Walz, M.
    Weisser, G.
    Engelmann, U.
    Weininger, R.
    Ernstberger, A.
    Sturm, J.
    EHEALTH2012 - HEALTH INFORMATICS MEETS EHEALTH - VON DER WISSENSCHAFT ZUR ANWENDUNG UND ZURUCK: MOBILE HEALTH & CARE - GESUNDHEITSVORSORGE IMMER UND UBERALL, 2012, : 109 - 114
  • [28] End-to-End Policy Monitoring and Enforcement for Service-Oriented Architecture
    Azarmi, Mehdi
    Bhargava, Bharat
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 58 - 65
  • [29] Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things
    Sahraoui, Somia
    Bilami, Azeddine
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, MISC 2016, 2016, : 249 - 260
  • [30] Investigating End-to-End Security in the Fifth Generation Wireless Capabilities and IoT Extensions
    Uher, J.
    Harper, J.
    Mennecke, R. G., III
    Patton, P.
    Farroha, B.
    CYBER SENSING 2016, 2016, 9826