End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture

被引:8
|
作者
Zhang, Wujun [1 ]
Zhang, Yueyu [1 ]
Chen, Jie [1 ]
Li, Hui [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2013年 / 16卷 / 04期
关键词
Machine-Type Communication; End-to-end security; Generic Authentication Architecture; Authentication and key agreement;
D O I
10.1007/s10586-013-0259-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Type Communication (MTC) and its related services have become the new business growth-point of mobile communication. However, application market with the size of about a hundred of million makes end-to-end security facing grand challenges, especially the repeated construction of authentication facilities for different applications. According to features of MTC, an end-to-end security scheme is proposed, which is based on the Generic Authentication Architecture (GAA), and is thus suitable for MTC communication in application layer. User authentication and session key agreement are achieved by the assistance of operator network in this scheme. Hence, the MTC server can only focus on service delivery. Performance of the proposal is also analyzed, and from this procedure, we obtain the function of lifetime of master session key against expected number of bootstrapping request. Finally, it is shown how the operator could set an optimized lifetime of master session key.
引用
收藏
页码:861 / 871
页数:11
相关论文
共 50 条
  • [31] EEE-GSM: End-to-End Encryption Scheme over GSM System
    Ramadan, Mohammed
    Du, Guohong
    Li, Fagen
    Xu, Chun Xiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 229 - 239
  • [32] 6LowPSec: An end-to-end security protocol for 6LoWPAN
    Glissaa, Ghada
    Meddeb, Aref
    AD HOC NETWORKS, 2019, 82 : 100 - 112
  • [33] iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency
    Li, Pengkun
    Su, Jinshu
    Wang, Xiaofeng
    PROCEEDINGS OF THE 2019 ACM SIGCOMM CONFERENCE POSTERS AND DEMOS (SIGCOMM '19), 2019, : 166 - 168
  • [34] HeComm: end-to-end secured communication in a heterogeneous IoT environment via fog computing
    Winderickx, Joni
    Singelee, Dave
    Mentens, Nele
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [35] Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques
    Pekerti, Albertus Anugerah
    Sasongko, Arif
    Indrayanto, Adi
    IEEE ACCESS, 2024, 12 : 75146 - 75168
  • [36] lwEPSep: A Lightweight End-to-end Privacy-preserving Security Protocol for CTI Sharing in IoT Environments
    Park, Hoonyong
    Kim, Jiyoon
    Lee, Sangmin
    Duguma, Daniel Gerbi
    You, Ilsun
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (05): : 1069 - 1081
  • [37] Group-based authentication and key agreement for machine-type communication
    Zhang, Yueyu
    Chen, Jie
    Li, Hui
    Cao, Jin
    Lai, Chenzhe
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (02) : 87 - 95
  • [38] Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure
    Prakasha, Krishna
    Muniyal, Balachandra
    Acharya, Vasundhara
    INFORMATION DISCOVERY AND DELIVERY, 2019, 48 (01) : 14 - 22
  • [39] Scheduling Scheme for Cellular-Based Machine-Type Communication
    Li Hongyan
    Du Bai
    Suo Long
    Li Jiandong
    CHINA COMMUNICATIONS, 2011, 8 (01) : 145 - 150
  • [40] Group Controller-based Authentication for Machine Type Communication Under LTE Network
    Pan, Qi
    Wen, Xiangming
    Lu, Zhaoming
    Wu, Huan
    2016 2ND INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY ENGINEERING (ICMITE 2016), 2016, : 223 - 226