End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture

被引:8
|
作者
Zhang, Wujun [1 ]
Zhang, Yueyu [1 ]
Chen, Jie [1 ]
Li, Hui [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
关键词
Machine-Type Communication; End-to-end security; Generic Authentication Architecture; Authentication and key agreement;
D O I
10.1007/s10586-013-0259-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Type Communication (MTC) and its related services have become the new business growth-point of mobile communication. However, application market with the size of about a hundred of million makes end-to-end security facing grand challenges, especially the repeated construction of authentication facilities for different applications. According to features of MTC, an end-to-end security scheme is proposed, which is based on the Generic Authentication Architecture (GAA), and is thus suitable for MTC communication in application layer. User authentication and session key agreement are achieved by the assistance of operator network in this scheme. Hence, the MTC server can only focus on service delivery. Performance of the proposal is also analyzed, and from this procedure, we obtain the function of lifetime of master session key against expected number of bootstrapping request. Finally, it is shown how the operator could set an optimized lifetime of master session key.
引用
收藏
页码:861 / 871
页数:11
相关论文
共 50 条
  • [41] A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things
    Guo, Yimin
    Guo, Yajun
    Xiong, Ping
    Yang, Fan
    Zhang, Chengde
    PERVASIVE AND MOBILE COMPUTING, 2024, 98
  • [42] A generic architecture for management and control of end-to-end quality of service over multiple domains
    Vandermeulen, F
    Vermeulen, B
    Demeester, P
    Steegmans, F
    Vermeulen, S
    COMPUTER COMMUNICATIONS, 2002, 25 (02) : 149 - 168
  • [43] Secure End-To-End Authentication for Mobile Banking
    Singh, Basudeo
    Jasmine, K. S.
    SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 223 - 232
  • [44] Secure IoT framework and 2D architecture for End-To-End security
    Choi, Jongseok
    In, Youngjin
    Park, Changjun
    Seok, Seonhee
    Seo, Hwajeong
    Kim, Howon
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (08): : 3521 - 3535
  • [45] End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC
    Moosavi, Sanaz Rahimi
    Izadifar, Arman
    SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2021, 2022, 1536 : 77 - 89
  • [46] Proposing packet-key based end-to-end security architecture for the post-LTE networks
    Saini, Akanksha
    Festijo, Enrique
    Jung, Younchan
    ICT EXPRESS, 2019, 5 (02): : 124 - 130
  • [47] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [48] An end-to-end security solution for SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +
  • [49] A transparent end-to-end security solution
    Thomas, S
    Misra, D
    Eswari, PRL
    Babu, NSC
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
  • [50] Synthesising End-to-End Security Protocols
    Thevathayan, Charles
    Bertok, Peter
    Fernandez, George
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447