메뉴 건너뛰기




Volumn 26, Issue 3, 2015, Pages 414-431

A novel group access authentication and key agreement protocol for machine-type communication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; AUTOMATION; INTERNET PROTOCOLS; LONG TERM EVOLUTION (LTE); MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; PERSONAL COMMUNICATION SYSTEMS;

EID: 84936759321     PISSN: 21615748     EISSN: 21613915     Source Type: Journal    
DOI: 10.1002/ett.2635     Document Type: Article
Times cited : (57)

References (31)
  • 1
    • 84936800836 scopus 로고    scopus 로고
    • ETSI TS 102 689 V1.1.2, Machine-to-Machine communications (M2M); M2M service requirements, 2011
    • ETSI TS 102 689 V1.1.2, Machine-to-Machine communications (M2M); M2M service requirements, 2011.
  • 2
    • 84936800837 scopus 로고    scopus 로고
    • GPP TR 23.888 V1.4.0. System Improvements for Machine-Type Communications, August 2011
    • 3GPP TR 23.888 V1.4.0. System Improvements for Machine-Type Communications, August 2011.
  • 3
    • 84936800838 scopus 로고    scopus 로고
    • (Available from:) Accessed on 16 April 2012
    • (Available from: http://www.3gpp.org/) Accessed on 16 April 2012.
  • 5
    • 79953785474 scopus 로고    scopus 로고
    • GRS: The green, reliability, and security of emerging machine to machine communications
    • Lu RX, Li X, Liang XH, Shen XM, Lin XD,. GRS: The green, reliability, and security of emerging machine to machine communications. IEEE Communications Magazine 2011; 49 (4): 28-35.
    • (2011) IEEE Communications Magazine , vol.49 , Issue.4 , pp. 28-35
    • Lu, R.X.1    Li, X.2    Liang, X.H.3    Shen, X.M.4    Lin, X.D.5
  • 6
    • 84859790284 scopus 로고    scopus 로고
    • Moving 2 mishap: M2M's impact on privacy and safety
    • Bailey DA,. Moving 2 mishap: M2M's impact on privacy and safety. IEEE Security and Privacy 2012; 10 (1): 84-87.
    • (2012) IEEE Security and Privacy , vol.10 , Issue.1 , pp. 84-87
    • Bailey, D.A.1
  • 7
    • 79953793010 scopus 로고    scopus 로고
    • Toward ubiquitous massive accesses in 3GPP machine-to-machine communications
    • Lien SY, Chen KC, Lin YH,. Toward ubiquitous massive accesses in 3GPP machine-to-machine communications. IEEE Communications Magazine 2011; 49 (4): 66-74.
    • (2011) IEEE Communications Magazine , vol.49 , Issue.4 , pp. 66-74
    • Lien, S.Y.1    Chen, K.C.2    Lin, Y.H.3
  • 9
    • 84858132895 scopus 로고    scopus 로고
    • Machine type communications in 3GPP networks: Potential, challenges, and solutions
    • Taleb T, Kunz A,. Machine type communications in 3GPP networks: potential, challenges, and solutions. IEEE Communications Magazine 2012; 50 (3): 178-184.
    • (2012) IEEE Communications Magazine , vol.50 , Issue.3 , pp. 178-184
    • Taleb, T.1    Kunz, A.2
  • 10
    • 84936800839 scopus 로고    scopus 로고
    • 3GPP TR 33.868 V0.5.0. Security aspects of Machine-Type Communications, July 2011
    • 3GPP TR 33.868 V0.5.0. Security aspects of Machine-Type Communications, July 2011.
  • 13
    • 47049127732 scopus 로고    scopus 로고
    • In WIMOB '07 Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications IEEE Computer Society Washington, DC, USA
    • Aboudagga N, Quisquater JJ, Eltoweissy M,. Group authentication protocol for mobile networks, In WIMOB '07 Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications IEEE Computer Society Washington, DC, USA, 2007; 1-9.
    • (2007) Group Authentication Protocol for Mobile Networks , pp. 1-9
    • Aboudagga, N.1    Quisquater, J.J.2    Eltoweissy, M.3
  • 14
    • 84870489156 scopus 로고    scopus 로고
    • A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks
    • Fu A, Lan S, Huang B, Zhu Z, Zhang Y,. A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks. IEEE Communications Letters 2012; 16 (11): 1744-1747.
    • (2012) IEEE Communications Letters , vol.16 , Issue.11 , pp. 1744-1747
    • Fu, A.1    Lan, S.2    Huang, B.3    Zhu, Z.4    Zhang, Y.5
  • 15
    • 84936800840 scopus 로고    scopus 로고
    • 3GPP TS 21.133 V4.1.0, 3G Security;Security Threats and Requirements, 2001
    • 3GPP TS 21.133 V4.1.0, 3G Security;Security Threats and Requirements, 2001.
  • 17
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • Zhang MX, Fang YG,. Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 2005; 4 (2): 734-742.
    • (2005) IEEE Transactions on Wireless Communications , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.X.1    Fang, Y.G.2
  • 18
    • 83655165222 scopus 로고    scopus 로고
    • S-AKA: A provable and secure authentication key agreement protocol for UMTS networks
    • Huang YL, Shen CY, Shieh SW,. S-AKA: a provable and secure authentication key agreement protocol for UMTS networks. IEEE Transactions on Vehicular Technology 2011; 60 (9): 4509-4519.
    • (2011) IEEE Transactions on Vehicular Technology , vol.60 , Issue.9 , pp. 4509-4519
    • Huang, Y.L.1    Shen, C.Y.2    Shieh, S.W.3
  • 19
    • 73149084427 scopus 로고    scopus 로고
    • A cocktail protocol with the authentication and key agreement on the UMTS
    • Ou HH, Hwang MS, Jan JK,. A cocktail protocol with the authentication and key agreement on the UMTS. Journal Of Systems And Software 2010; 83 (2): 316-325.
    • (2010) Journal of Systems and Software , vol.83 , Issue.2 , pp. 316-325
    • Ou, H.H.1    Hwang, M.S.2    Jan, J.K.3
  • 20
  • 21
    • 79953899288 scopus 로고    scopus 로고
    • On the security of an enhanced UMTS authentication and key agreement protocol
    • Hwang MS, Chong SK, Ou HH,. On the security of an enhanced UMTS authentication and key agreement protocol. European Transactions on Telecommunications 2011; 22 (3): 1541-8251.
    • (2011) European Transactions on Telecommunications , vol.22 , Issue.3 , pp. 1541-8251
    • Hwang, M.S.1    Chong, S.K.2    Ou, H.H.3
  • 22
    • 33748634936 scopus 로고    scopus 로고
    • An improvement for authentication protocol in third-generation wireless networks
    • Zhang Y, Fujise M,. An improvement for authentication protocol in third-generation wireless networks. IEEE Transactions on Wireless Communications 2006; 5 (9): 2348-2352.
    • (2006) IEEE Transactions on Wireless Communications , vol.5 , Issue.9 , pp. 2348-2352
    • Zhang, Y.1    Fujise, M.2
  • 23
    • 84879786156 scopus 로고    scopus 로고
    • Extension of an efficient 3GPP authentication and key agreement protocol
    • Lee CC, Chen CL, Ou HH, Chen LA,. Extension of an efficient 3GPP authentication and key agreement protocol. Wireless Personal Communications 2011; 68 (3): 861-872.
    • (2011) Wireless Personal Communications , vol.68 , Issue.3 , pp. 861-872
    • Lee, C.C.1    Chen, C.L.2    Ou, H.H.3    Chen, L.A.4
  • 24
    • 84936800841 scopus 로고    scopus 로고
    • 3GPP TS 33.401 V11.1.0. 3GPP System Architecture Evolution (SAE); Security architecture, September 2011
    • 3GPP TS 33.401 V11.1.0. 3GPP System Architecture Evolution (SAE); Security architecture, September 2011.
  • 26
    • 40749151471 scopus 로고    scopus 로고
    • Adaptive hysteresis using mobility correlation for fast handover
    • Lee L, Kim D, Chung B, Yoon H,. Adaptive hysteresis using mobility correlation for fast handover. IEEE Communications Letters 2008; 12 (2): 152-154.
    • (2008) IEEE Communications Letters , vol.12 , Issue.2 , pp. 152-154
    • Lee, L.1    Kim, D.2    Chung, B.3    Yoon, H.4
  • 29
    • 0033356116 scopus 로고    scopus 로고
    • A survey of security issues in multicast communications
    • Moyer MJ, Rao JR, Rohatgi P,. A survey of security issues in multicast communications. IEEE Network 1999; 13 (6): 12-23.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 12-23
    • Moyer, M.J.1    Rao, J.R.2    Rohatgi, P.3
  • 30
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • Rafaeli S, Hutchison D,. A survey of key management for secure group communication. ACM Computing Surveys 2003; 35 (3): 309-329.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 31
    • 84888857761 scopus 로고    scopus 로고
    • (Available from:) Accessed on 15 March 2012
    • AVISPA v1.1 User Manual 2006, (Available from: http://avispa-project.org/) Accessed on 15 March 2012.
    • AVISPA v1.1 User Manual 2006


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.