Secure machine-type communications in LTE networks

نویسندگان

  • Chengzhe Lai
  • Rongxing Lu
  • Hui Li
  • Dong Zheng
  • Xuemin Shen
چکیده

With a great variety of potential applications, machine-type communications (MTC) is gaining a tremendous interest from mobile network operators and research groups. MTC is standardized by the 3rd Generation Partnership Project (3GPP), which has been regarded as the promising solution facilitating machine-to-machine communications. In the latest standard, 3GPP proposes a novel architecture for MTC, in which the MTC server is located outside the operator domain. However, the connection between the 3GPP core network and MTC server in this scenario is insecure; consequently, there are distrustful relationships among MTC device, core network, and MTC server. If the security issue is not well addressed, all applications involved in MTC cannot be put into the market. To address this problem, we propose an end-to-end security scheme for MTC based on the proxy-signature technique, called E2SEC. Specifically, both the MTC device and MTC server can establish strong trustful relationships with each other by using the proxy signatures issued by the 3GPP core network. Moreover, we present some implementation considerations of E2SEC and analyze the performance during authentication by comparing the operational cost of three cases that apply three different signature algorithms, that is, ElGamal, Schnorr, and DSA. Through security analysis by using Automatic Cryptographic Protocol Verifier (ProVerif), we conclude that the proposed E2SEC scheme can achieve the security goals and prevent various security threats. Copyright © 2015 John Wiley & Sons, Ltd.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Secure and Smart Media Sharing Based on Direct Communications among Mobile Devices Underlying in Lte-a Cellular Network

Cellular network service providers are trying to expand their capacity to accommodate the increasing mobile traffic demand by adopting new mobile technologies like user proximity based Device-to-Device (D2D) communication underlying existing Long Term Evolution-Advanced (LTE-A) cellular network, which is a promising technology to overcome legacy cellular network’s congestion. D2D communication ...

متن کامل

Energy Efficient Scheduling for Grouped M2M Communications over Cellular Networks

In this paper, energy-efficient scheduling for grouped machine-type devices deployed in cellular networks is investigated. We introduce a scheduling-based cooperation incentive scheme which enables machine nodes to organize themselves locally, create machine groups, and communicate through group representatives to the base station. This scheme benefits from a novel scheduler design which takes ...

متن کامل

Energy-efficient scheduling and grouping for machine-type communications over cellular networks

In this paper, energy-efficient scheduling for grouped machine-type devices deployed in cellular networks is investigated. We introduce a scheduling-based cooperation incentive scheme which enables machine nodes to organize themselves locally, create machine groups, and communicate through group representatives to the base station. This scheme benefits from a novel scheduler design which takes ...

متن کامل

Networks : Spectrum Sharing , Random Access and Connectivity

Machine type communications (or Machine-to-Machine / M2M) communications have emerged as an important paradigm in wireless communication networks. The current M2M standardization activities are presented and their implementation in 4G/LTE networks is described in detail. The chapter is divided in three parts that are related to the evolution of the Future M2M communication Networks. The first p...

متن کامل

Novel Multicast Key Management Scheme for PMIPv6-Based LTE Networks

Multicast services grow up quickly and thus they urgently call for a secure mechanism to provide the confidentiality and privacy of communications. Recently, multicast issues in Proxy Mobile IPv6 (PMIPv6) networks have generated a great deal of interest among researchers, and several multicast schemes had been proposed. However, these schemes do not take security issues into account. In an atte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Wireless Communications and Mobile Computing

دوره 16  شماره 

صفحات  -

تاریخ انتشار 2016