2016
DOI: 10.1109/jiot.2016.2614976
|View full text |Cite
|
Sign up to set email alerts
|

Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
21
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(23 citation statements)
references
References 29 publications
1
21
0
Order By: Relevance
“…Until now, there are only few research works on the handover authentication process for a large number of devices in wireless networks [18][19][20][21]. 3GPP TR 33.868 [6] has proposed a MD grouping method for congestion avoidance.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Until now, there are only few research works on the handover authentication process for a large number of devices in wireless networks [18][19][20][21]. 3GPP TR 33.868 [6] has proposed a MD grouping method for congestion avoidance.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, it cannot achieve the mutual authentication and the traceability of MDs. Subsequently, Kong et al present a secure handover session key management mechanism for a group on-board UEs via mobile relay in LTE-A networks [21]. By the scheme in [21], each on-board UE generates the session key with the connected Donor eNB (DeNB) and sends the encrypted session key by using the MME's public key to the mobile relay node (MRN).…”
Section: Related Workmentioning
confidence: 99%
“…The encrypted text is known as cipher text, and in order to retrieve the text back the receiver needs the key which is only meant to be shared with the authorized users [7]. During this process data or information is encrypted into cipher text format with the help of the a secret key, and the secret key is only shared with only the authorized person so that only they are able to decrypt the data or information using the same key which is used to encrypt the data or information [9]. Through the presence of the steganography could be traced in the history literatures.…”
Section: Cryptographymentioning
confidence: 99%
“…Qinglei Kong et.al. [9] proposed a secure handover session key management scheme via mobile relay in networks. Specifically, to achieve forward and backward key separations, the session key shared between the on-board user equipment and the connected donor evolved nodes.…”
Section: Cryptographymentioning
confidence: 99%
See 1 more Smart Citation