153 research outputs found

    A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks

    Get PDF
    Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention. To reach the safety of MTC, applications in networks must meet the low power consumption requirements of devices and mass transmission device. When a large number of MTC devices get connected to the network, each MTC device must implement an independent access authentication process according to the 3GPP standard, which will cause serious traffic congestion in the Long Term Evolution (LTE) network. In this article, we propose a new group access authentication scheme, by which a huge number of MTC devices can be simultaneously authenticated by the network and establish an independent session key with the network respectively. Experimental results show that the proposed scheme can achieve robust security and avoid signaling overload on LTE network

    Secret sharing-based authentication and key agreement protocol for machine-type communications

    Full text link
    [EN] One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered one of the main foundations for the continued growth of Internet of Things connectivity and an important issue to be treated in the development of 5G networks. This article describes some protocols for the group-based authentication of devices/sensors in Internet of Things and presents a new group authentication protocol based on Shamir's secret and Lagrange interpolation formula. The new protocol protects privacy, avoids unauthorized access to information, and assists in the prevention of attacks, as replay, distributed denial of service, and man-in-the-middle. A security analysis and comparisons among the 3GPP evolved packet system authentication and key agreement standard protocol and other recent group authentication protocols were performed toward proving the efficiency of the proposed protocol. The comparisons regard security properties and computational and communication costs. The safety of the protocol was formally verified through simulations conducted by automated validation of internet security protocols and applications.Lopes, APG.; Hilgert, LO.; Gondim, PRL.; Lloret, J. (2019). Secret sharing-based authentication and key agreement protocol for machine-type communications. International Journal of Distributed Sensor Networks (Online). 15(4):1-21. https://doi.org/10.1177/1550147719841003S12115

    A Novel Cross-Layer Authentication Protocol for the Internet of Things

    Full text link
    An innovative cross-layer authentication protocol that integrates cryptography-based authentication and physical layer authentication (PLA) is proposed for massive cellular Internet of things (IoT) systems. Due to dramatic increases in the number of cellular IoT devices, a centralized authentication architecture in which a mobility management entity in core networks administers authentication of massive numbers of IoT devices may cause network congestion with large signaling overhead. Thus, a distributed authentication architecture in which a base station in radio access networks authenticates IoT devices locally is presented. In addition, a cross-layer authentication protocol is designed with a novel integration strategy under the distributed authentication architecture, where PLA, which employs physical features for authentication, is used as preemptive authentication in the proposed protocol. Theoretical analysis and numerical simulations were performed to analyze the trade-off between authentication performance and overhead in the proposed authentication method compared with existing authentication protocols. The results demonstrate that the proposed protocol outperforms conventional authentication and key agreement protocols in terms of overhead and computational complexity while guaranteeing low authentication error probability

    ASPIS: A Holistic and Practical Mechanism for Efficient MTC Support over Mobile Networks

    Get PDF

    Group authentication protocols for Internet of Things (IoT) – QoS and Security Properties Evaluation

    Get PDF
    Trabalho de conclusão de curso (graduação)—Universidade de Brasília, Faculdade de Tecnologia, 2016.The objective of this work is to provide an overview on group authentication protocols for Internet of Things (IoT) and to propose two new group protocols. Both protocols perform authentication and key agreement among a group of devices and a Mobility Management Entity (MME) and aim performance improvements, ensuring a robust security and anonymity protection. One scheme is based on both Elliptical Curves Diffie-Hellman protocol and bilinear pairing and the other is a lightweight symmetric protocol based on Shamir’s secret. Additionally, both protocols have their performance and security objectives accomplishment analyzed and compared with other works already proposed in the literature. The performance analysis and comparison comprises communication, computational, verification and storage costs. Some of the security features analyzed are forward/backward secrecy (FS/BS), anonymity and resistance to several attacks. Finally, the protocols were formally validated by AVISPA tool

    Security-centric analysis and performance investigation of IEEE 802.16 WiMAX

    Get PDF
    fi=vertaisarvioitu|en=peerReviewed
    • …
    corecore