End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture

被引:8
|
作者
Zhang, Wujun [1 ]
Zhang, Yueyu [1 ]
Chen, Jie [1 ]
Li, Hui [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
关键词
Machine-Type Communication; End-to-end security; Generic Authentication Architecture; Authentication and key agreement;
D O I
10.1007/s10586-013-0259-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Type Communication (MTC) and its related services have become the new business growth-point of mobile communication. However, application market with the size of about a hundred of million makes end-to-end security facing grand challenges, especially the repeated construction of authentication facilities for different applications. According to features of MTC, an end-to-end security scheme is proposed, which is based on the Generic Authentication Architecture (GAA), and is thus suitable for MTC communication in application layer. User authentication and session key agreement are achieved by the assistance of operator network in this scheme. Hence, the MTC server can only focus on service delivery. Performance of the proposal is also analyzed, and from this procedure, we obtain the function of lifetime of master session key against expected number of bootstrapping request. Finally, it is shown how the operator could set an optimized lifetime of master session key.
引用
收藏
页码:861 / 871
页数:11
相关论文
共 50 条
  • [31] Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication
    Kumar, Gulshan
    Saha, Rahul
    Rai, Mritunjay Kumar
    Kim, Tai-Hoon
    IEEE ACCESS, 2018, 6 : 46558 - 46567
  • [32] End-to-End Security for the IoT
    Dooley, James
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [33] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [34] Trust based Security Solution for Internet of Things Healthcare Solution: An End-to-End Trustworthy Architecture
    Jaigirdar, Fariha Tasmin
    PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 1757 - 1760
  • [35] End-to-end security in embedded system for modern mobile communication technologies
    Venu, D.
    J, Babu
    Saravanakumar, R.
    Cosio Borda, Ricardo Fernando
    Abd Algani, Yousef Methkal
    Kiran Bala, B.
    Measurement: Sensors, 2022, 23
  • [36] POLYNOMIAL END-TO-END COMMUNICATION
    AWERBUCH, B
    MANSOUR, Y
    SHAVIT, N
    30TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 1989, : 358 - 363
  • [37] TAES: Two-factor Authentication with End-to-End Security against VoIP Phishing
    Hou, Dai
    Han, Hao
    Novak, Ed
    2020 IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2020), 2020, : 340 - 345
  • [38] An End-to-End Machine Learning based Unified Architecture for Non-Intrusive Load Monitoring
    Wali, Syed
    ul Haq, Muhammad Hassan
    Kazmi, Majida
    Qazi, Saad Ahmed
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (03) : 7217 - 7222
  • [39] An Efficient End-to-End Mutual Authentication Scheme for 2G-GSM System
    Ramadan, Mohammed
    Li, Fagen
    Xu, Chun Xiang
    Abdalla, Ahmed
    Abdalla, Hisham
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2016, : 319 - 324
  • [40] A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems
    Genge, Bela
    Haller, Piroska
    Duka, Adrian-Vasile
    Sandor, Hunor
    AT-AUTOMATISIERUNGSTECHNIK, 2019, 67 (05) : 417 - 428