메뉴 건너뛰기




Volumn 2013, Issue , 2013, Pages

Eap-based group authentication and key agreement protocol for machine-type communications

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS AUTHENTICATIONS; AUTHENTICATION AND KEY AGREEMENT PROTOCOLS; BANDWIDTH CONSUMPTION; FORMAL VERIFICATIONS; MACHINE-TO-MACHINE COMMUNICATIONS; MACHINE-TYPE COMMUNICATIONS; MACHINETYPE COMMUNICATION (MTC); SIGNALING OVERHEADS;

EID: 84888870405     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2013/304601     Document Type: Article
Times cited : (61)

References (31)
  • 2
    • 85081791648 scopus 로고    scopus 로고
    • 3GPP TR 23. 888 V1. 4. 0. System Improvements for Machine-Type Communications, 2011
    • 3GPP TR 23. 888 V1. 4. 0. System Improvements for Machine-Type Communications, 2011
  • 3
    • 84863126291 scopus 로고    scopus 로고
    • Energy-efficient cooperative spectrum sensing by optimal scheduling in sensor-aided cognitive radio networks
    • 2-s2.0-84857336379 10.1109/TVT.2011.2179323
    • Deng R., Chen J., Yuen C., Cheng P., Sun Y., Energy-efficient cooperative spectrum sensing by optimal scheduling in sensor-aided cognitive radio networks. IEEE Transactions on Vehicular Technology 2012 61 2 716 725 2-s2.0-84857336379 10.1109/TVT.2011.2179323
    • (2012) IEEE Transactions on Vehicular Technology , vol.61 , Issue.2 , pp. 716-725
    • Deng, R.1    Chen, J.2    Yuen, C.3    Cheng, P.4    Sun, Y.5
  • 4
    • 84872043672 scopus 로고    scopus 로고
    • Energy-efficient cooperative spectrum sensing in sensor-aided cognitive radio networks
    • Cheng P., Deng R., Chen J., Energy-efficient cooperative spectrum sensing in sensor-aided cognitive radio networks. IEEE Wireless Communications 2012 19 6 100 105
    • (2012) IEEE Wireless Communications , vol.19 , Issue.6 , pp. 100-105
    • Cheng, P.1    Deng, R.2    Chen, J.3
  • 5
    • 79960590167 scopus 로고    scopus 로고
    • M2M: The Internet of 50 billion devices
    • Emmerson B., M2M: the Internet of 50 billion devices. WinWin Magazine 2010 19 22
    • (2010) WinWin Magazine , pp. 19-22
    • Emmerson, B.1
  • 8
    • 64249083197 scopus 로고    scopus 로고
    • A key management protocol with robust continuity for sensor networks
    • 2-s2.0-64249083197 10.1016/j.csi.2008.06.005
    • Wen M., Zheng Y.-F., Ye W.-J., Chen K.-F., Qiu W.-D., A key management protocol with robust continuity for sensor networks. Computer Standards and Interfaces 2009 31 4 642 647 2-s2.0-64249083197 10.1016/j.csi.2008.06.005
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.4 , pp. 642-647
    • Wen, M.1    Zheng, Y.-F.2    Ye, W.-J.3    Chen, K.-F.4    Qiu, W.-D.5
  • 9
    • 81055124247 scopus 로고    scopus 로고
    • Proceedings of the IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC '11) September 2011 Xi'an, China 2-s2.0-81055124247 10.1109/ICSPCC.2011.6061682
    • Jiang R., Luo J., Tu F., Zhong J., LEP: a lightweight key management scheme based on ebs and polynomial for wireless sensor networks. Proceedings of the IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC '11) September 2011 Xi'an, China 1 5 2-s2.0-81055124247 10.1109/ICSPCC.2011.6061682
    • LEP: A Lightweight Key Management Scheme Based on Ebs and Polynomial for Wireless Sensor Networks , pp. 1-5
    • Jiang, R.1    Luo, J.2    Tu, F.3    Zhong, J.4
  • 10
    • 79953785474 scopus 로고    scopus 로고
    • GRS: The green, reliability, and security of emerging machine to machine communications
    • 2-s2.0-79953785474 10.1109/MCOM.2011.5741143
    • Lu R., Li X., Liang X., Shen X., Lin X., GRS: the green, reliability, and security of emerging machine to machine communications. IEEE Communications Magazine 2011 49 4 28 35 2-s2.0-79953785474 10.1109/MCOM.2011.5741143
    • (2011) IEEE Communications Magazine , vol.49 , Issue.4 , pp. 28-35
    • Lu, R.1    Li, X.2    Liang, X.3    Shen, X.4    Lin, X.5
  • 11
    • 84858132895 scopus 로고    scopus 로고
    • Machine type communications in 3GPP networks: Potential, challenges, and solutions
    • 2-s2.0-84858132895 10.1109/MCOM.2012.6163599
    • Taleb T., Kunz A., Machine type communications in 3GPP networks: potential, challenges, and solutions. IEEE Communications Magazine 2012 50 3 178 184 2-s2.0-84858132895 10.1109/MCOM.2012.6163599
    • (2012) IEEE Communications Magazine , vol.50 , Issue.3 , pp. 178-184
    • Taleb, T.1    Kunz, A.2
  • 12
    • 85081794542 scopus 로고    scopus 로고
    • 3GPP TR 33. 868 V0. 5. 0, Security aspects of Machine-Type Communications, 2011
    • 3GPP TR 33. 868 V0. 5. 0, Security aspects of Machine-Type Communications, 2011
  • 13
    • 84863472230 scopus 로고    scopus 로고
    • Knox: Privacy-preserving auditing for shared data with large groups in the cloud
    • New York, NY, USA Springer
    • Wang B., Li B., Li H., Knox: privacy-preserving auditing for shared data with large groups in the cloud. Applied Cryptography and Network Security 2012 New York, NY, USA Springer 507 525
    • (2012) Applied Cryptography and Network Security , pp. 507-525
    • Wang, B.1    Li, B.2    Li, H.3
  • 16
    • 40249105903 scopus 로고    scopus 로고
    • Sas-based group authentication and key agreement protocols
    • Springer
    • Laur S., Pasini S., Sas-based group authentication and key agreement protocols. Public Key Cryptography-PKC 2008 Springer 197 213
    • (2008) Public Key Cryptography-PKC , pp. 197-213
    • Laur, S.1    Pasini, S.2
  • 21
  • 23
    • 78651592040 scopus 로고    scopus 로고
    • An individual and group authentication model for wireless network services
    • 2-s2.0-78651592040 10.4156/jcit.vol5.issue1.10
    • Ngo H. H., Wu X., Le P. D., Srinivasan B., An individual and group authentication model for wireless network services. Journal of Convergence Information Technology 2010 5 1 82 94 2-s2.0-78651592040 10.4156/jcit.vol5. issue1.10
    • (2010) Journal of Convergence Information Technology , vol.5 , Issue.1 , pp. 82-94
    • Ngo, H.H.1    Wu, X.2    Le, P.D.3    Srinivasan, B.4
  • 24
    • 84856695571 scopus 로고    scopus 로고
    • Group-based authentication and key agreement
    • 2-s2.0-84856695571 10.1007/s11277-010-0104-7
    • Chen Y.-W., Wang J.-T., Chi K.-H., Tseng C.-C., Group-based authentication and key agreement. Wireless Personal Communications 2012 62 4 965 979 2-s2.0-84856695571 10.1007/s11277-010-0104-7
    • (2012) Wireless Personal Communications , vol.62 , Issue.4 , pp. 965-979
    • Chen, Y.-W.1    Wang, J.-T.2    Chi, K.-H.3    Tseng, C.-C.4
  • 25
    • 47049127732 scopus 로고    scopus 로고
    • Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob '07) October 2007 White Plains, NY, USA 2-s2.0-47049127732 10.1109/WIMOB.2007.4390822
    • Aboudagga N., Quisquater J.-J., Eltoweissy M., Group authentication protocol for mobile networks. Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob '07) October 2007 White Plains, NY, USA 2-s2.0-47049127732 10.1109/WIMOB.2007.4390822
    • Group Authentication Protocol for Mobile Networks
    • Aboudagga, N.1    Quisquater, J.-J.2    Eltoweissy, M.3
  • 28
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz N., Elliptic curve cryptosystems. Mathematics of Computation 1987 48 177 203 209
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 29
    • 85015402934 scopus 로고    scopus 로고
    • Proceedings of the Advances in Cryptology (CRYPTO '85) 1986 Springer
    • Miller V. S., Use of elliptic curves in cryptography. Proceedings of the Advances in Cryptology (CRYPTO '85) 1986 Springer 417 426
    • Use of Elliptic Curves in Cryptography , pp. 417-426
    • Miller, V.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.