2014 IEEE International Conference on Communications (ICC) 2014
DOI: 10.1109/icc.2014.6883452
|View full text |Cite
|
Sign up to set email alerts
|

SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks

Abstract: With extensive promising applications, machine to machine (M2M) communications or machine-type communication (MTC) have attached a tremendous interest among mobile network operators and research groups. Supporting multiple MTC devices has been considered as an essential requirement in M2M communications. How to achieve a secure and efficient access authentication for a group of MTC devices during roaming is a challenging issue. In this paper, in order to simultaneously resolve the access security and efficienc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
25
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 43 publications
(26 citation statements)
references
References 18 publications
1
25
0
Order By: Relevance
“…In this section, we firstly analyze the performance of the proposed UPPGHA by comparing it with the current LTE-A handover mechanisms in [7,8] and other related schemes [18][19][20][21] in terms of the signaling cost, the communication cost, and the computational cost. Then, we evaluate the situation when there are some attacks in execution of protocols.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 4 more Smart Citations
“…In this section, we firstly analyze the performance of the proposed UPPGHA by comparing it with the current LTE-A handover mechanisms in [7,8] and other related schemes [18][19][20][21] in terms of the signaling cost, the communication cost, and the computational cost. Then, we evaluate the situation when there are some attacks in execution of protocols.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…For the scheme in [18], when the first MD moves into the coverage of the target eNB, the source eNB contacts with the target eNB and transmits all of security context information for the MTC group to the target eNB, and then the target eNB can directly perform the mutual authentication with other group members only with two-handshake without the involvement of the source eNB. For the scheme in [19], taking the advantage of broadcasting and aggregation to design the signaling message, the number of signaling messages for the group is only ( + 9) for the roaming phase. For the scheme in [21], due to the use of proxy mechanism, when on-board UEs hand off the target DeNB, the target DeNB can directly obtain the session key with the UEs without the involvement of the MME.…”
Section: Related Schemesmentioning
confidence: 99%
See 3 more Smart Citations