Please use this identifier to cite or link to this item:
|Title:||GBAAM : group-based access authentication for MTC in LTE networks||Authors:||Cao, Jin
|Keywords:||DRNTU::Engineering::Computer science and engineering||Issue Date:||2015||Source:||Cao, J., Ma, M., & Li, H. (2015). GBAAM: group-based access authentication for MTC in LTE networks. Security and Communication Networks, 8(17), 3282-3299.||Series/Report no.:||Security and communication networks||Abstract:||Machine Type Communication (MTC), as one of the most important communication approaches in the future mobile communication, has drawn more and more attention. To meet the requirements of low power consumption of devices and mass device transmission is the key issue to achieve MTC applications security in the Long Term Evolution (LTE) networks. When a large number of MTC devices simultaneously connect to the network, each MTC device needs to implement an independent access authentication procedure in the current third Generation Partnership Project (3GPP) standard, which will cause a severe signaling congestion in the LTE network. In this paper, we propose a group-based access authentication scheme, by which a good deal of MTC devices can be simultaneously authenticated by the network and establish an independent session key with the network respectively. Our scheme cannot only greatly reduce the signal transmission for mass of devices to the network and thus avoid the signaling overload over the LTE network, but also achieve robust security including Key Forward/Backward Secrecy (KFS/KBS) and non-repudiation verification. The experimental results and formal verification by using the TLA+ and TLC show that the proposed scheme is secure against various malicious attacks.||URI:||https://hdl.handle.net/10356/96335
|ISSN:||1939-0114||DOI:||10.1002/sec.1252||Rights:||© 2015 John Wiley & Sons, Ltd. This is the author created version of a work that has been peer reviewed and accepted for publication by Security and Communication Networks, John Wiley & Sons, Ltd. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1002/sec.1252].||Fulltext Permission:||open||Fulltext Availability:||With Fulltext|
|Appears in Collections:||EEE Journal Articles|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.