Filters








35,766 Hits in 7.9 sec

EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications

Rong Jiang, Chengzhe Lai, Jun Luo, Xiaoping Wang, Hong Wang
2013 International Journal of Distributed Sensor Networks  
In this paper, we propose a group authentication and key agreement protocol, called EG-AKA, for machine-type communications combining elliptic curve Diffie-Hellman (ECDH) based on EAP framework.  ...  Machine to machine (M2M) communications, also called machine-type communications (MTC), has widely been utilized in applications such as telemetry, industrial, automation, and SCADA systems.  ...  Acknowledgments This work is supported by China Scholarship Council and the National Natural Science Foundation of China under Grant no. 61170261.  ... 
doi:10.1155/2013/304601 fatcat:5mfblstutvc2daihowi4wuqrw4

Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks

Probidita Roychoudhury, Basav Roychoudhury, Dilip Kumar Saikia
2017 Security and Communication Networks  
This paper introduces Hierarchical Group based Mutual Authentication and Key Agreement (HGMAKA) protocol to address those issues and also enables the small cell heterogeneous architecture in line with  ...  standardized Machine Type Communication (MTC) which allows communication between entities without any human intervention.  ...  Conclusion This paper presents a hierarchical group based mutual authentication scheme, HGMAKA, for Machine Type Communication over LTE network.  ... 
doi:10.1155/2017/1701243 fatcat:6fliolqapbculaboz4hihddsou

A Secure and light-weighted Group based Authentication and Key Agreement Protocol involving ECDH for Machine Type Communications in 3GPP Networks

Geeta Kakarla, Phanikumar Singamsetty
2020 Indian Journal of Computer Science and Engineering  
In our paper, we have proposed the Secure and Lightweight Group Based Authentication and Key Agreement (SL-Grp-AKA) protocol based on Elliptic-Curve Diffie-Hellman cryptography, where the group of such  ...  Machine-Type Communications (MTC) is one of the primary aspects of Internet of Things (IoT) which has gained vast markets and application scenarios.  ...  Addressing these issues, SL-Grp-AKA: a secure and light-weighted group authenticating and key agreement protocol among the machine type communications in 3 rd Generation Partnership Project (3GPP) networks  ... 
doi:10.21817/indjcse/2020/v11i5/201105213 fatcat:dfwryhojmnhqhfb4ilsawotcsa

Group Controller-based Authentication for Machine Type Communication Under LTE Network

Qi Pan, Xiangming Wen, Zhaoming Lu, Huan Wu
2016 DEStech Transactions on Engineering and Technology Research  
In this paper, we proposed an efficient, available and scalable group controller-based authentication and key agreement (GC-AKA) protocol for devices to ensure the safety in the long term evolution (LTE  ...  For security, MTC devices need to follow the Evolved Packet System-Authentication and Key Agreement (EPS-AKA) protocol to guarantee the secure requirements in the machine-to-machine (M2M) communications  ...  In this paper, we proposed an effective and dependable group controller-based authentication and key agreement (GC-AKA) mechanism for resource-constrained MTC devices based on those ideas above.  ... 
doi:10.12783/dtetr/icmite20162016/4601 fatcat:lzrdghlxazarpo2z3itflclwbu

A Systematic Dynamic Key Agreement Mechanism for LTE Advanced Networks in the Internet of Things

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Jinguo et al. proposed a Group-Based Verification and Key-Agreement protocol with dynamically updating policy for mutual authentication.  ...  Moreover, the development of Group premised communication and individual authentication mechanisms to every Machine Type Communication device (MTTD) would lead to signal-congestion in real-time networking  ...  Type Transmission/Devices ECDH Elliptic Curve Diffie-Hellman AES Advanced Encryption Standard GTK Group Temporary Key AKA Authentication and Key Agreement IIoT Industrial Internet of Things ECC Elliptic  ... 
doi:10.35940/ijitee.b1031.1292s319 fatcat:fexp65ledbczhd57b4uf6f3wra

A secure group based authentication protocol for machine to machine communications in LTE-WLAN interworking architecture

Mariya Ouaissa, Abdallah Rhattoy
2019 Indonesian Journal of Electrical Engineering and Computer Science  
In this paper, we propose a group based authentication and key agreement protocol for machine type communications combining Elliptic Curve based Diffie-Hellman (ECDH) on the Extensible Authentication Protocol  ...  The group based model under an M2M architecture, especially when the Machine Type Communication (MTC) devices belong to the non 3rd Generation Partnership Project (3GPP) network, will face a new challenge  ...  based authentication protocol for machine to machine communications … (Mariya Ouaissa) Table 2 . 2 Comparisons of Properties among the Authentication and Key Agreement Protocols Vulnerability EAP-AKA  ... 
doi:10.11591/ijeecs.v16.i2.pp848-859 fatcat:e5pksovi2ba6tmxsmwdi36c4gy

A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks

Mariya Ouaissa, A. Rhattoy
2018 International Journal of Electrical and Computer Engineering (IJECE)  
Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention.  ...  In this article, we propose a new group access authentication scheme, by which a huge number of MTC devices can be simultaneously authenticated by the network and establish an independent session key with  ...  wih New Scheme of Group-based AKA for Machine Type Communication over LTE ….  ... 
doi:10.11591/ijece.v8i2.pp1169-1181 fatcat:dq2nmhumvrhixketcztf7pyiha

Security Issues on Machine to Machine Communications

Chengzhe Lai
2012 KSII Transactions on Internet and Information Systems  
authentication protocols and cryptographic algorithms, such as group authentication and key agreement protocol used to solve group access authentication of M2M, proxy signature for M2M system to tackle  ...  Machine to machine (M2M) communications is the hottest issue in the standardization and industry area, it is also defined as machine-type communication (MTC) in release 10 of the 3rd Generation Partnership  ...  a new group authentication and key agreement protocol for group access authentication of M2M.  ... 
doi:10.3837/tiis.2012.02.003 fatcat:oii5nuafujbl5h6yhnlvrqjeje

A Secure Model for Machine to Machine Device Domain Based Group in a Smart City Architecture

Mariya Ouaissa, Ecole Nationale Supérieure des Arts et Métiers Moulay-Ismail University, Abdallah Rhattoy, Moulay-Ismail University
2019 International Journal of Intelligent Engineering and Systems  
Secondly our proposed examine the area of authentication for sensor networks by make a combination between algorithms such as TinyPK and Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in order  ...  In this paper, we propose a secure group model include different authentication mechanisms combined between D2D and WSN technologies that allow the protection of M2M devices through strong encryption and  ...  In this section, we propose a D2D authentication protocol based in a mechanism for the key agreement protocol of Bluetooth.  ... 
doi:10.22266/ijies2019.0228.16 fatcat:6jd4fxj6hfanlnzddhcu55lhti

Authentication Protocols for Internet of Things: A Comprehensive Survey

Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang, Lei Shu
2017 Security and Communication Networks  
These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (  ...  In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication  ...  Based on roaming phase, SEGR can achieving mutual authentication and key agreement between all Machine-type Communication (MTC) devices when a group of MTC devices roams between 3GPP and WiMAX networks  ... 
doi:10.1155/2017/6562953 fatcat:xehq47dklvfnxeljd6wvrksmaq

A Flexible and Lightweight Group Authentication Scheme [article]

Yucel Aydin, Gunes Karabulut Kurt, Enver Özdemir, Halim Yanikomeroglu
2020 arXiv   pre-print
Nor do they address the scalability problem of massive machine type communication (mMTC) networks.  ...  Our approach is also resistant to the replay and man-in-the-middle attacks. The proposed approach also includes a solution for key agreement and key distribution problems in mMTC environments.  ...  The authors [21] propose a dynamic group based efficient and secure protocol to authenticate a group of machine type communication (MTC) devices.  ... 
arXiv:1909.06371v5 fatcat:72q4fsvm4nf5ziffaidzpyx5ri

UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks

Jin Cao, Hui Li, Maode Ma, Fenghua Li
2018 Security and Communication Networks  
In this paper, we propose a simple and secure uniform group-based handover authentication scheme for mMTC devices based on the multisignature and aggregate message authentication code (AMAC) techniques  ...  Machine Type Communication (MTC), as one of the most important wireless communication technologies in the future wireless communication, has become the new business growth point of mobile communication  ...  Introduction Machine Type Communication (MTC), also known as Machine to Machine (M2M), can realize intelligent and interactive seamless connection among people, machine, and system via wireless communication  ... 
doi:10.1155/2018/6854612 fatcat:xcpnu62curcfbgohcdycyloo34

A Novel Group-based Secure Lightweight Authentication and Key Agreement Protocol forMachine-Type Communication

M.M. Modiri, J. Mohajeri, M. Salmasizadeh
2021 Scientia Iranica. International Journal of Science and Technology  
This paper proposes a group-based secure lightweight authentication and key agreement (GSL-AKA) protocol for machine-to-machine (M2M) communication.  ...  Hence, various authentication and key agreement (AKA) protocols were proposed for Long Term Evolution (LTE) and 5G networks.  ...  The group-based authentication and key agreement (AKA) protocols for M2M communication, authenticate mutually a group of MTCDs and the network entities (MME and HSS) and share some secret session keys  ... 
doi:10.24200/sci.2021.54832.3936 fatcat:2u3mpxmhmbcs3nfzp4r6u724wm

Authentication Protocols for Internet of Things: A Comprehensive Survey [article]

Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang
2016 arXiv   pre-print
Specifically, we select and in-detail examine more than forty authentication protocols developed for or applied in the context of the IoT under four environments, including: (1) Machine to machine communications  ...  Based on the current survey, we identify open issues and suggest hints for future research.  ...  Based on roaming phase, SEGR can achieving mutual authentication and key agreement between all Machine-type Communication (MTC) devices when a group of MTC devices roams between 3GPP and WiMAX networks  ... 
arXiv:1612.07206v1 fatcat:awa32vfghnhwvdzrmjh2t2r2cm

Secure machine-type communications in LTE networks

Chengzhe Lai, Rongxing Lu, Hui Li, Dong Zheng, Xuemin Sherman Shen
2015 Wireless Communications and Mobile Computing  
Our previous works [15] [16] [17] [18] also discuss the related security issues on M2M communications, for example, group access authentication and key agreement and efficient data authentication.  ...  With a great variety of potential applications, machine-type communications (MTC) is gaining a tremendous interest from mobile network operators and research groups.  ...  Figure 3 . 3 Network Figure 4 . 4 Mutual authentication and key agreement procedure between machine-type communications (MTC) device and MTC server.  ... 
doi:10.1002/wcm.2612 fatcat:jsp652qhangwxlowtud4lvruvq
« Previous Showing results 1 — 15 out of 35,766 results