Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/106880
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLai, Chengzheen
dc.contributor.authorLu, Rongxingen
dc.contributor.authorLi, Huien
dc.contributor.authorZheng, Dongen
dc.contributor.authorShen, Sherman Xueminen
dc.date.accessioned2019-06-27T06:49:45Zen
dc.date.accessioned2019-12-06T22:20:14Z-
dc.date.available2019-06-27T06:49:45Zen
dc.date.available2019-12-06T22:20:14Z-
dc.date.issued2015en
dc.identifier.citationLai, C., Lu, R., Li, H., Zheng, D., & Shen, S. X. (2016). Secure machine-type communications in LTE networks. Wireless Communications and Mobile Computing, 16(12), 1495-1509. doi:10.1002/wcm.2612en
dc.identifier.issn1530-8669en
dc.identifier.urihttps://hdl.handle.net/10356/106880-
dc.description.abstractWith a great variety of potential applications, machine‐type communications (MTC) is gaining a tremendous interest from mobile network operators and research groups. MTC is standardized by the 3rd Generation Partnership Project (3GPP), which has been regarded as the promising solution facilitating machine‐to‐machine communications. In the latest standard, 3GPP proposes a novel architecture for MTC, in which the MTC server is located outside the operator domain. However, the connection between the 3GPP core network and MTC server in this scenario is insecure; consequently, there are distrustful relationships among MTC device, core network, and MTC server. If the security issue is not well addressed, all applications involved in MTC cannot be put into the market. To address this problem, we propose an end‐to‐end security scheme for MTC based on the proxy‐signature technique, called E2SEC. Specifically, both the MTC device and MTC server can establish strong trustful relationships with each other by using the proxy signatures issued by the 3GPP core network. Moreover, we present some implementation considerations of E2SEC and analyze the performance during authentication by comparing the operational cost of three cases that apply three different signature algorithms, that is, ElGamal, Schnorr, and DSA. Through security analysis by using Automatic Cryptographic Protocol Verifier (ProVerif), we conclude that the proposed E2SEC scheme can achieve the security goals and prevent various security threats.en
dc.format.extent15 p.en
dc.language.isoenen
dc.relation.ispartofseriesWireless Communications and Mobile Computingen
dc.rights© 2015 John Wiley & Sons, Ltd. published by Hindawi Publishing Corporation. This is an open-access article distributed under the terms of the Creative Commons Attribution License.en
dc.subjectM2Men
dc.subjectMTCen
dc.subjectDRNTU::Engineering::Electrical and electronic engineeringen
dc.titleSecure machine-type communications in LTE networksen
dc.typeJournal Articleen
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen
dc.identifier.doi10.1002/wcm.2612en
dc.description.versionPublished versionen
item.grantfulltextopen-
item.fulltextWith Fulltext-
Appears in Collections:EEE Journal Articles
Files in This Item:
File Description SizeFormat 
Secure machine-type communications in LTE network.pdf1.32 MBAdobe PDFThumbnail
View/Open

SCOPUSTM   
Citations 20

7
Updated on Jul 24, 2020

PublonsTM
Citations 20

6
Updated on Mar 10, 2021

Page view(s)

153
Updated on Aug 7, 2022

Download(s) 50

30
Updated on Aug 7, 2022

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.