End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture

被引:8
|
作者
Zhang, Wujun [1 ]
Zhang, Yueyu [1 ]
Chen, Jie [1 ]
Li, Hui [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
关键词
Machine-Type Communication; End-to-end security; Generic Authentication Architecture; Authentication and key agreement;
D O I
10.1007/s10586-013-0259-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Type Communication (MTC) and its related services have become the new business growth-point of mobile communication. However, application market with the size of about a hundred of million makes end-to-end security facing grand challenges, especially the repeated construction of authentication facilities for different applications. According to features of MTC, an end-to-end security scheme is proposed, which is based on the Generic Authentication Architecture (GAA), and is thus suitable for MTC communication in application layer. User authentication and session key agreement are achieved by the assistance of operator network in this scheme. Hence, the MTC server can only focus on service delivery. Performance of the proposal is also analyzed, and from this procedure, we obtain the function of lifetime of master session key against expected number of bootstrapping request. Finally, it is shown how the operator could set an optimized lifetime of master session key.
引用
收藏
页码:861 / 871
页数:11
相关论文
共 50 条
  • [11] An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
    Nashwan, Shadi
    Nashwan, Imad I. H.
    SENSORS, 2021, 21 (15)
  • [12] Two-Factor Authentication with End-to-End Password Security
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Shirvanian, Maliheh
    Saxena, Nitesh
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461
  • [13] Machine Learning Based End-to-End Constellation Training for Communication Systems
    Lin, Po-Chiang
    PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 1768 - 1773
  • [14] An end-to-end communication architecture for collaborative virtual environments
    Shirmohammadi, S
    Georganas, ND
    COMPUTER NETWORKS, 2001, 35 (2-3) : 351 - 367
  • [15] Sizzle: A standards-based end-to-end security architecture for the embedded Internet
    Gupta, Vipul
    Wurm, Michael
    Zhu, Yu
    Millard, Matthew
    Fung, Stephen
    Gura, Nils
    Eberle, Hans
    Shantz, Sheueling Chang
    PERVASIVE AND MOBILE COMPUTING, 2005, 1 (04) : 425 - 445
  • [16] End-to-end authentication based secure communication in vehicular ad hoc networks (VANET)
    Kumar, Ankit
    Sharma, Neeraj
    Kumar, Abhishek
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (01): : 219 - 229
  • [17] Modelling Features-Based Birthmarks for Security of End-to-End Communication System
    Li, Meilian
    Nazir, Shah
    Khan, Habib Ullah
    Shahzad, Sara
    Amin, Rohul
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [18] The end of end-to-end security?
    Bradner, S
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [19] End-to-end security protocol for mobile communications with end-user identification/authentication
    Chang, CC
    Chen, KL
    Hwang, MS
    WIRELESS PERSONAL COMMUNICATIONS, 2004, 28 (02) : 95 - 106
  • [20] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN
    Nashwan, Shadi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 607 - 642