2018
DOI: 10.11591/ijece.v8i2.pp1169-1181
|View full text |Cite
|
Sign up to set email alerts
|

A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks

Abstract: Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention. To reach the safety of MTC, applications in networks must meet the low power consumption requirements of devices and mass transmission device. When a large number of MTC devices get connected to the network, each MTC device must implement an independent access authentication process according to the 3GPP standard, which will cause serious traffic co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 17 publications
(13 reference statements)
0
5
0
Order By: Relevance
“…The MTC server is the end-target of the data sent by MTCDs. It receives data via the backhaul from the eNodeB and makes it available for access by human or machine type users through some application in Figure 1 [21], [22]. One of the important tasks of eNodeB in the LTE network is Radio Resource Management (RRM), which is the acceptance or rejection of network connection requests, ensuring optimal distribution of radio resources between terminals.…”
Section: System Architecturementioning
confidence: 99%
“…The MTC server is the end-target of the data sent by MTCDs. It receives data via the backhaul from the eNodeB and makes it available for access by human or machine type users through some application in Figure 1 [21], [22]. One of the important tasks of eNodeB in the LTE network is Radio Resource Management (RRM), which is the acceptance or rejection of network connection requests, ensuring optimal distribution of radio resources between terminals.…”
Section: System Architecturementioning
confidence: 99%
“…traffic. This key is derived from KeNB and two parameters, the first indicates that this key is used for user plane encryption, and the second is the identifier of the encryption algorithm [13].…”
Section: Eps Key Hierarchymentioning
confidence: 99%
“…The current EPS-AKA and EAP-AKA are not suitable for group authentication; they need to be modified to apply to the group authentication of MTC. In a previous work [11,12] we proposed two new group access authentication schemes, by which a huge number of MTC devices can be simultaneously authenticated by the network and establish an independent session key with the network respectively. Experimental results show that the proposed scheme can achieve robust security and avoid signalling overload on LTE networks.…”
Section: Several New Security Issues and Existing Solutionsmentioning
confidence: 99%