- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Table of Contents
International Journal of Distributed Sensor Networks
Volume 2013 (2013), Article ID 304601, 14 pages
EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications
1School of Computer, National University of Defense Technology, Changsha 410073, China
2Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada N2L 3G1
3State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China
4Xi’an Communication Institute, Xi’an 710106, China
Received 2 July 2013; Revised 23 August 2013; Accepted 23 August 2013
Academic Editor: Zhong Fan
Copyright © 2013 Rong Jiang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Machine to machine (M2M) communications , which is also defined as machine-type communications (MTC)  in release 10 of the 3rd Generation Partnership Project (3GPP), is one of the hottest issues not only in the standardization but also in the industrial circles. In M2M communications, both wireless and wired systems can communicate with other devices of the same ability. Thanks to MTC, many applications become possible [3, 4]. M2M communications uses a device, such as a sensor or meter, to capture an event (such as temperature and inventory level). Then this event is delivered through a wireless, wired, or hybrid network to an application (software program), which translates the captured event into meaningful information. For example, the event can be translated into what items need to be restocked . Since MTC communications does not need direct human intervention, it is soon becoming a market-changing force for the next-generation intelligent real-time networked applications [6, 7].
Recently, most research on MTC has focused on congestion control, resource management, key management [8, 9], and so forth; however, there are few studies on security aspects. Lu et al.  point out that the existing challenges of M2M is energy efficiency (green), reliability, and security (GRS). Taleb and Kunz  present some potential challenges and solutions of MTC in 3GPP networks. Some security threats and corresponding solutions of 3GPP are discussed in . Privacy preservation is also an important issue in M2M communications [13–15]. A new group message authentication protocol , which utilises only limited authenticated communication, combines short authenticated strings protocol with classical key agreement procedures. This SAS-based group authentication and key agreement protocol is secure against active attacks. If mobile terminals of non-3GPP short-distance wireless communication want to access the 3GPP core network, they must execute access authentication. Most access authentication protocols are based on Extensible Authentication Protocol (EAP), such as EAP-AKA , EAP-TTLS , EAP-PEAP , EAP-LEAP , and EAP-SPEKE . However, the existing access authentication protocols cannot provide enough security for MTC ; on the other hand, present standard has not considered the group-based access authentication. Recently, several standardization organizations start to present the concept and requirement of group authentication, but the mechanism and procedure have not yet been developed.
To the best of our knowledge, the existing network authentication systems are mainly designed for a single object, and they all need 3 or 4 rounds of interaction to realize the mutual authentication between a user and a server. In practical applications, however, there may be a large number of users with the same properties in a network, such as MTC, and user terminals can form a group when they are in the same region, or belong to the same application, or have the same behavior. In these applications, if substantial numbers of user terminals of a group access the network over a short period of time successively, the available authentication methods may suffer from network congestion by the increasing signal of the network. In order to prevent network from congesting and efficiently authenticate user terminals of a group, the concept of group authentication, which performs authentication for group units, is introduced. As a kind of network authentication technology, group authentication aims to authenticate multiple or all users over a shorter period of time. In this technology, the group is assigned a unique identifier, and user terminals are authenticated together as corporate entities. Group authentication can be fulfilled by utilizing the authentication agency or the gateway. After successful group authentication, user terminals and network side entities can share some keys.
In the current literature, a few authentication protocols of group communication have been proposed. An individual and group authentication model, which uses dynamic key cryptography and group key management for individual and group of users and services, is proposed for wireless network services . Chen et al. propose G-AKA protocol for a group of mobile stations roaming from the same home network to a serving network . Aboudagga et al. propose a group authentication protocol for mobile networks and design a new architecture for authentication management and an associated authentication protocol for mobile groups and individual nodes over heterogeneous domains . However, there are still no appropriate group authentication methods for MTC in 3GPP. On the other hand, EAP-AKA  is an important authentication and key agreement protocol between 3G/LTE and non-3GPP, but EAP-AKA does not support group authentication mechanism and cannot be applied to group-based MTC. In addition, there are some vulnerabilities in EAP-AKA, such as disclosure of user identity, man-in-the-middle attack .
In this paper, in order to resolve group access authentication for MTC, we propose a novel group authentication and key agreement protocol based on Mun’s protocol , named EG-AKA. Our protocol guarantees stronger security and provides better performance than the existing protocols. The main idea of our protocol is that the first MTC device of a group, which wants to access to 3GPP core network, performs a full AKA authentication procedure. In this process, the first MTC device obtains group authentication information and group temporary key (GTK) on behalf of other MTC devices of the same group. Then the authentication, authorization, and accounting server (AAA server) is enabled to carry out mutual authentication with remaining MTC devices of the group using obtained group authentication information and GTK without interacting with the home subscriber server (the HSS). The authentication delay can be decreased as a whole and the signaling overhead between the AAA server and the HSS is considerably reduced.
The remainder of this paper is organized as follows. In Section 2, we will introduce relevant background and knowledge. In Section 3, we propose our group authentication protocol. In Section 4, the authentication and other secrecy properties are verified by the model checking tools, and detailed performance evaluations are given in Section 5. Finally, we draw our conclusion and give the future work in Section 6.
Before going to the details of the proposed protocol, we first recall the elliptic curve Diffie-Hellman technique , Mun’s Protocol , which serves as the basis of the proposed EG-AKA protocol. Then, we present the abbreviations and network architecture used in this paper.
2.1. Elliptic Curve Diffie-Hellman
Elliptic curve cryptography (ECC), which is based on the algebraic structure of elliptic curves over finite fields, is a famous approach used in public-key cryptography. This cryptography was first proposed in 1985 independently by Koblitz  and Miller . The primary advantage of ECC is that the key size is smaller while providing the same level of security, which can reduce storage and transmission requirements; that is, an elliptic curve group could provide the same level of security afforded by an RSA-based system with a large modulus and correspondingly larger key. For example, a 160 bit ECC public key should provide comparable security to a 1024 bit RSA public key. Elliptic curve Diffie-Hellman (ECDH) is an anonymous key agreement protocol that allows two parties, each having an elliptic curve public-private key pair, to establish a shared secret over an insecure channel . This shared secret may be directly used as a key, or better yet, to derive another key which can then be used to encrypt subsequent communications using a symmetric key cipher. It is a variant of the Diffie-Hellman protocol using elliptic curve cryptography.
Key establishment protocol of elliptic curve Diffie-Hellman is described briefly as follows. Suppose Alice wants to establish a shared key with Bob, but the channel available for them is not secure and may be eavesdropped by the others. Initially, the domain parameters (i.e., in the prime case or in the binary case) must be agreed upon. Also, each party must have a key pair suitable for elliptic curve cryptography, consisting of a private key (a randomly selected integer in the interval ) and a public key (where , that is, the result of adding together times). Let Alice’s key pair be and Bob’s key pair be . Each party must have the other party’s public key (an exchange must occur). Alice computes . Bob computes . The shared secret is (the coordinate of the point). Most standardized protocols based on ECDH derived a symmetric key from using some hash-based key derivation function. The shared secret calculated by both parties is equal, because . The only information about her private key that Alice initially exposes is her public key. So, no party other than Alice can determine Alice’s private key, unless that party can solve the elliptic curve discrete logarithm problem. Bob’s private key is similarly secure. No party other than Alice or Bob can compute the shared secret, unless that party can solve the elliptic curve Diffie-Hellman problem .
2.2. Mun’s Protocol
Mun et al.  propose a new authentication and key agreement protocol based on EAP-AKA designed for 3G-WLAN interworking. This protocol combines elliptic curve Diffie-Hellman (ECDH) with symmetric key cryptosystem to overcome several vulnerabilities. In addition, their protocol provides perfect forward secrecy (PFS) to guarantee stronger security, mutual authentication, and resistance to replay attack. The major advantages of their protocol can be summarized as follows:(1)providing strong user identity protection by encrypted IMSI using shared secret key between user equipment and HSS;(2)using ECDH to provide perfect forward secrecy between the user equipment and the AAA server;(3)resisting against three types of man-in-the middle attack.
Mun’s protocol can guarantee stronger security; however, similar to EAP-AKA, the protocol is not suitable for group-based MTC due to lack of specific mechanism. We will modify Mun’s protocol to design a novel security enhanced group authentication protocol for MTC.
2.3. Network Architecture
In order to avoid confusing, we list the abbreviations used throughout the rest of this paper in Table 1.
The network architecture mainly consists of four parts: machine-type communication devices, access point, the authentication, authorization, and accounting server, and the home subscriber server, as shown in Figure 1.
Machine-Type Communication (MTC) Devices. An MTC device, which communicates through a public land mobile network (PLMN), is a device equipped for machine-type communications.
Access Point (AP). AP is a device that allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth, or other related standards.
The Authentication, Authorization, and Accounting (AAA) Server. In the LTE network, the authentication, authorization, and accounting (AAA) server provides access authentication services for MTC devices on behalf of the 3GPP core network.
The Home Subscriber Server (HSS). In the LTE network, the home subscriber server (HSS) locates in 3GPP core network and provides authentication and management services for MTC devices on behalf of 3GPP core network.
3. The Proposed Group Authentication Protocol
In this section, we give the details of the group authentication and key agreement protocol for MTC (EG-AKA) to facilitate non-3GPP MTC devices to access to 3GPP core network (CN). In order to achieve this aim, there are three phases in the proposed protocol: group initialization, authentication data distribution, and mutual authentication and key agreement.
3.1. Group Initialization
In the group initialization phase, each MTC device has a permanent ID (PID), such as international mobile subscriber identification number (IMSI). This PID is a long-term private identity that identifies MTC device and should be installed in the MTC device by the supplier in order to allow the MTC device to register in a 3GPP network. At the same time, we assume that each MTC device has preshared a secret key with 3GPP CN, and these MTC devices form several groups based on certain principles, and then the supplier provides a group key (GK) to each group for authentication. As shown in Table 2, we create an index table to manage information of MTC devices and group; the index table contains fields of group identity, MTC device identity (PID) for each MTC device, and initial values. Table 3 is the protocol notations used in this paper.
3.2. Authentication Data Distribution
Let be the first MTC device initiating authentication in group 1. We assume that a secure communication channel between the AAA server and the HSS has already been established and can provide security services to the transmitted data. The authentication data distribution processes as follows.
Step 1. sends an access request message to the AP.
Step 2. AP sends an EAP Request/Identity message to require the identity of .
Step 3. Upon receiving the EAP Request/Identity message sent by AP, firstly, the computes respectively, and then generates as follows: where is calculated as
Step 4. sends its to the AAA server through AP, and then the AAA server finds out corresponding HSS according and forwards and its own to the HSS by authentication data request message.
Step 5. When the HSS receives authentication data request message containing ’s and , it verifies the received in .
If verification passes, the HSS derives and from and using , respectively. Then HSS retrieves the corresponding group key to generate a group temporary key .
Step 6. At the moment, the HSS also computes all temporary identities of the devices in group 1 and generates a temporary index table (as shown in Table 4) of group 1; then the HSS sends , , , and temporary index table to the AAA server by a preestablish security tunnel.
Step 7. The AAA server receives and stores , , , and temporary index table for future use.
3.3. Mutual Authentication and Key Agreement
Step 8. The AAA server generates and computes as follows: where represents the th run of mutual authentication with . After that, the AAA server selects random number and computes on .
Step 9. The AAA server generates and sends and to .
Step 10. After receiving , verifies the received in as follows.(1)Firstly, computes (2)then, computes (3) verifies whether equals or not. If is not the same as , the HSS or the AAA server is not valid. Therefore, the terminates the procedure.
Step 11. If verification is successful, computes , and .
Step 12. sends and to the AAA server by authentication response message, at the same time, also calculates the MSK as EAP-AKA.
Step 13. When the AAA server receives and , it also computes using and verifies . If verification passes, AAA server also calculates the MSK as EAP-AKA.
Step 14. The AAA server sends with EAP Success message to the AP.
Step 15. The AP verifies whether received equals its own ID or not. If the result is incorrect, the AP drops the MSK and then terminates the execution. Otherwise the AP stores the MSK. Then AP encrypts using the MSK and sends it with EAP Success message to .
Step 16. Through decryption, recovers and verifies whether or not the received from the AP in Step 15 equals to the used in Step 4. If the result is correct, the procedure of authentication and key agreement is successful. Consequently, can securely access to 3GPP CN using the MSK.
At this point, the full authentication and key agreement procedure for one MTC device is completed. The procedure is shown in Figure 2.
When other MTC device in the same group want to access the 3GPP CN, the AAA server performs mutual authentication and key agreement with locally using the existing . Taking the MTC device in the same group as an example, the full authentication and key agreement procedure for it is described as follows.
Steps 1 and 2 are similar to s.
Step 3*. Upon receiving EAP request/identity message by AP, similarly, the computes and , respectively, and then generates as follows: where is calculated as
Step 4*. sends its to the AAA server through AP. Note that, the AAA server does not need to authenticate the group (G1) which belongs to by the HSSs assistance.
The remaining steps are similar to s.
The other MTC devices perform the authentication and key agreement procedures similar to s until all devices complete the authentication.
4. Security Analysis
In this section, both security analysis and formal verification implemented by the AVISPA tool are conducted to show that the proposed protocol can work correctly to achieve security properties.
4.1. Security Property
In Table 5, we compare our proposed EG-AKA protocol with the other main AKA protocols: Mun’s protocol , EAP-AKA , EAP-TTLS , EAP-PEAP , EAP-LEAP , and EAP-SPEKE . The comparison results demonstrate that our protocol can provide the most comprehensive security performance compared to the other AKA protocols. Providing group access authentication and heterogeneous network access are the two main advantages of our protocol. In particularly, our proposed protocol meets the following security properties.
Protect User and Group Permanent Identity. In our protocol, PID cannot be got by attackers. The reason is that the MTC device generates the TID by using the and then sends TID to the HSS. Therefore, the MTC device and the HSS can only retrieve user and group permanent identity included in TID through using . Thus, our protocol provides strong user and group identity protection.
Secure against Man-in-the Middle Attack. In our proposed protocol, only the MTC devices and HSS can obtain real ID information of the devices and the group from encrypted temporary ID information. An attacker cannot derive and modify this information. The AP receives the EAP Success message with sent by the AAA server. After that, the AP can verify whether its own ID equal to the received ID or not. If not the procedure of authentication and key agreement will fail. Furthermore, the AP will send encrypted by to the MTC device. The MTC device can verify whether it has accessed this AP or not. The MTC device can verity the legality of HSS by as well. Thus, our protocol can resist against several types of man-in-the middle attack.
Secure against Replay Attack. In our protocol, random numbers generated by , generated by the HSS and generated by the AAA server are temporarily used in generating challenge messages toward the opposite side, respectively. Since these random numbers used in each authentication procedure are different, even if an attacker acquires a random number in a authentication procedure, he still cannot fake challenge messages by reusing the random number in a new authentication procedure. Meanwhile, these two sites maintain an identical initial value to keep themselves synchronized throughout AKA processing. An out-of-sync initialization value will lead to authentication failure. Thus a node without the required random numbers and initial value cannot perform a replay attack on our system.
Resistance to Impersonate Attack. Note that, in our protocol, all the MTC devices of a group share a common GTK. If an MTC device, without loss of generality, suppose that intends to impersonate another MTC device in the same group, for example, . may eavesdrop traffic between and the HSS, but cannot generate unique and . Therefore, cannot generate a correct to impersonate to perform a successful authentication with the HSS. Similarly, cannot get the between and the AAA server. Therefore, it cannot decrypt traffic between and the AAA server. In summary, the 3GPP CN can easily distinguish one MTC device from another even though all MTC devices use the same GTK; at the same time, one MTC device cannot decrypt traffic between any other MTC device and the 3GPP CN.
Perfect Forward Secrecy (PFS). Our protocol utilizes ECDH to provide PFS between the MTC device and the AAA server. While generating , our protocol uses and that are not related with . Therefore, if disclosure of occurs, attackers cannot get . In other words, guessing is a computationally difficult problem.
Provide Mutual Authentication and Key Agreement. We can verify that the proposed protocol can provide a successful mutual authentication between MTC devices and the 3GPP CN by formal verification described in the Section 4.2. Key agreement includes two parts: (a) between the MTC device and the AAA server: the key agreement between the MTC device and the AAA server can achieve through ECDH with symmetric key, and the MTC device and the AAA server can share a secret key by Steps 11–13; (b) between the MTC device and the AP: the key agreement between the MTC device and the AP is the same as EAP-AKA , and the MTC device and AP can securely communicate with other by the MSK.
4.2. Formal Verification
The primary goal of our proposed protocol is to provide mutual authentication and key agreement services between MTC devices and the 3GPP CN. We tested our protocol using formal security verification tool known as the “Automated Validation of Internet Security Protocols and Applications” (AVISPA) . The AVISPA project aims at developing a push-button, industrial-strength technology for the analysis of large-scale Internet security-sensitive protocols and applications. This technology will speed up the development of the next generation of network protocols, improve their security, and therefore increase the public acceptance of advanced, distributed IT applications based on them. AVISPA will achieve this by advancing specification and deduction technology to the point where industry protocols can be specified and automatically analyzed. A central aim of the project is then to integrate this technology into a robust automated tool, tuned on practical, large-scale problems, and migrated to standardization bodies, whose protocol designers are in dire need of such tools. In the AVISPA tool, protocols are specified using the High Level Protocol Specification Language (HLPSL for short). Then, the HLPSL specification is translated into an Intermediate Format which is used by the various verification tools embedded in AVISPA. We use On-the-fly-Model-Checker (OFMC) and SAT-based model checker (SATMC) to text our EG-AKA protocol. The authentication goals that we need to verify are shown in Figure 3. The output of the model checking results are shown in Figures 4 and 5. We can conclude that the proposed protocol can accomplish the goal of mutual authentication, and it can resist those malicious attacks such as replay attacks, MitM attacks, and secrecy attacks under the test of AVISPA using the OFMC back-end and SATMC back-end.
5. Performance Evaluation
In this section, we give a detailed performance evaluation of the proposed protocol from the signaling overhead and the transmission cost point of view.
5.1. Signaling Overhead
In order to evaluate the signaling overhead, we consider the following scenario: the number of MTC device is , and the number of group is . Suppose that each MTC device launches (re)authentications. For EAP-AKA, authentication procedures performed by an MTC device require the total number of signaling messages which grows linearly with . In EAP-AKA protocol, there are 12 signaling messages for one complete authentication procedure. Thus, the number of signaling message of a MTC device is and the total number of signal message is . In Mun’s protocol, the MTC device runs a full authentication using 8 messages at one time, a total of messages is required. Similarly, when MTC devices belonging to group perform authentication, there are a total of messages for EAP-AKA, and a total of messages for Mun’s protocol. In the proposed protocol, the first MTC device initiating authentication in the group complete the whole procedure of authentication and the number of signaling message is 8. The rest devices of the group only need 6 signaling messages. In this scenario, the number of the rest devices is and the total number of signaling message is . If each device executes another re-authentications, then the total number of signaling message is . Figure 6 illustrates the number of signaling messages of the proposed procedure over the existing authentication protocols for several different cases. It can be seen that signaling messages of several AKA protocols are increasing as the number of MTC devices increases. Among three AKA protocols, our EG-AKA outperforms other protocols. This is because our protocol shifts the impact of the number of MTC devices on network to the impact of that of the number of MTC device groups on network; our EG-AKA can reduce both authentication delay and signaling overhead within the core network.
5.2. Bandwidth Consumption
In order to analyze the bandwidth consumption, we assume that AVs are transmitted every time the HSS successfully authenticates one ME, and there are MTCDs forming group. Without loss of generality, Table 6 shows the setting of parameters for evaluating bandwidth consumption.
The bandwidth consumption of AKA protocols are as follows, where represents the bandwidth consumption of the authentication of the first MTCD.(1) Bandwidth analysis of EAP-AKA: the sizes of authentication messages are calculated as follows: The overall bandwidth consumption for devices is calculated as .(2) Bandwidth analysis of Mun’s scheme: the sizes of authentication messages are calculated as follows: (i).(ii).(iii).(iv).(v).(vi).(vii). The overall bandwidth consumption for devices is calculated as .(3) Bandwidth analysis of EG-AKA: the sizes of authentication messages are calculated as follows: (i).(ii).(iii).(iv).(v).(vi). Consider where represents the bandwidth consumption of authentication of each remaining ME.(i).(ii).(iii).
The overall bandwidth consumption for devices is calculated as .
Figure 7 shows the bandwidth consumption of several AKA protocols, when the number of the MEs is different. From Figures 7(a) to 7(d), we can see that the bandwidth consumption of our EG-AKA protocol is much better than that of EPS-AKA and Mun’s scheme. Meanwhile, our EG-AKA protocol can provide much better security compared to the other protocols.
5.3. Transmission Cost
In order to evaluate the transmission cost, assume that energy dissipated during 1-message transmission between MTC device and HSS is unit, the energy dissipated during 1-message transmission between MTC device and AAA server is unit (), and energy dissipated during 1-message transmission between AAA server and HSS is unit (). Assume that the number of devices in a group is .
Since the other EAP-AKA based protocols only enhance the security aspect and the procedure of signaling mode is the same as the traditional EAP-AKA protocol, we only compare our proposed protocol with the traditional EAP-AKA protocol. We consider the following two case as shown in Figure 2 in our proposed protocol:(a)the AAA server has to fetch the fresh authentication vector form the HSS;(b)the AAA server already has the fresh authentication vector.
In case (a), there are 4 messages between the MTC device and the AAA server, and there are 2 messages between the AAA server and HSS during one authentication procedure. The communication cost of our proposed protocol in this case is
In case (b), since the AAA server already has the fresh authentication vector, it does not need to communicate with the HSS anymore. Thus, the communication cost of our proposed protocol in this case is
Similarly, in the EAP-AKA protocol, there are 8 messages between the MTC device and the AAA server, and there are 2 messages between the AAA server and HSS during one authentication procedure. Therefore, the communication cost of the EAP-AKA protocol in case (a) is and in case (b) is
Suppose that the AAA server fetches authentication vectors during the authentication procedure. The average communication cost of the proposed protocol is The average communication cost of the EAP-AKA protocol is We define a improvement rate to evaluate the improvement of our proposed protocol compared to the EAP-AKA protocol. The definition of improvement rate is: From the definition of , we know that the bigger the is, the smaller the transmission cost of our proposed protocol is. Figure 8 plots the improvement rate varying with the number of devices, the number of fetched authentication vectors, and the energy dissipated during 1-message transmission between the MTC device and AAA server. From the figures, we can easily see that the more the number of MTC devices in the group is, the bigger the is. The reason is that in our proposed protocol we only need one communication between the AAA server and the HSS for the whole group authentication. While in the EAP-AKA protocol each MTC device has to execute a complete authentication. Furthermore, the more number of authentication vector the AAA server fetches from the HSS, the bigger the is. The reason is that our proposed protocol only needs one authentication vector for the whole group. The communication cost can be reduced dramatically.
6. Conclusion and Future Work
In this paper, we propose a group authentication and key agreement protocol for MTC device under the EAP framework, named EG-AKA. To the best of our knowledge, there is no protocol in the current literature that handles specific group access authentication for non-3GPP MTC. The proposed EG-AKA protocol not only enhances security on the basis of Mun’s protocol, but also design specific group authentication mechanism for MTC. Formal verification and security analysis show that the proposed protocol is secure and fulfill its design goals. Detailed evaluations of performance illustrate that the proposed protocol achieves better performance in terms of transmission and signaling overhead compared with several existing protocols. In our future work, we will consider more practical group authentication protocol based on symmetric cryptography for resource-constrained devices in heterogeneous networks.
For more details see Figure 9.
This work is supported by China Scholarship Council and the National Natural Science Foundation of China under Grant no. 61170261.
- T. Bourgeau, H. Chaouchi, and P. Kirci, “Machine-to-machine communications,” in Next-Generation Wireless Technologies, pp. 221–241, Springer, New York, NY, USA, 2013.
- 3GPP TR 23. 888 V1. 4. 0. System Improvements for Machine-Type Communications, 2011.
- R. Deng, J. Chen, C. Yuen, P. Cheng, and Y. Sun, “Energy-efficient cooperative spectrum sensing by optimal scheduling in sensor-aided cognitive radio networks,” IEEE Transactions on Vehicular Technology, vol. 61, no. 2, pp. 716–725, 2012.
- P. Cheng, R. Deng, and J. Chen, “Energy-efficient cooperative spectrum sensing in sensor-aided cognitive radio networks,” IEEE Wireless Communications, vol. 19, no. 6, pp. 100–105, 2012.
- B. Emmerson, “M2M: the Internet of 50 billion devices,” WinWin Magazine, pp. 19–22, 2010.
- C. Lai, H. Li, X. Li, and J. Cao, “A novel group access authentication and key agreement protocol for machine-type communication,” Transactions on Emerging Telecommunications Technologies. In press.
- C. Lai, H. Li, Y. Zhang, and J. Cao, “Security issues on machine to machine communications,” KSII Transaction on Internet and Information Systems, vol. 6, no. 2, pp. 498–514, 2012.
- M. Wen, Y.-F. Zheng, W.-J. Ye, K.-F. Chen, and W.-D. Qiu, “A key management protocol with robust continuity for sensor networks,” Computer Standards and Interfaces, vol. 31, no. 4, pp. 642–647, 2009.
- R. Jiang, J. Luo, F. Tu, and J. Zhong, “LEP: a lightweight key management scheme based on ebs and polynomial for wireless sensor networks,” in Proceedings of the IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC '11), pp. 1–5, Xi'an, China, September 2011.
- R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: the green, reliability, and security of emerging machine to machine communications,” IEEE Communications Magazine, vol. 49, no. 4, pp. 28–35, 2011.
- T. Taleb and A. Kunz, “Machine type communications in 3GPP networks: potential, challenges, and solutions,” IEEE Communications Magazine, vol. 50, no. 3, pp. 178–184, 2012.
- 3GPP TR 33. 868 V0. 5. 0, Security aspects of Machine-Type Communications, 2011.
- B. Wang, B. Li, and H. Li, “Knox: privacy-preserving auditing for shared data with large groups in the cloud,” in Applied Cryptography and Network Security, pp. 507–525, Springer, New York, NY, USA, 2012.
- R. Jiang, J. Luo, and X. Wang, “An attack tree based risk assessment for location privacy in wireless sensor networks,” in Proceedings of the 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–4, 2012.
- B. Wang, B. Li, and H. Li, “Oruta: privacy-preserving public auditing for shared data in the cloud,” in Proceedings of the IEEE 5th International Conference on Cloud Computing (CLOUD '12), pp. 295–302, 2012.
- S. Laur and S. Pasini, “Sas-based group authentication and key agreement protocols,” in Public Key Cryptography-PKC, pp. 197–213, Springer, 2008.
- J. Arkko and H. Haverinen, “Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA),” 2006.
- P. Funk and S. Blake-Wilson, “EAP Tunneled TLS Authentication protocol version 1 (EAP-TTLS v1),” http://tools.ietf.org/html/draft-funk-eap-ttls-v1-00.
- Microsoft, “Securing Wireless LANs with PEAP and Passwords, Introduction: Choosing a Strategy for Wireless LAN Security,” http://technet.microsoft.com/en-us/library/dd162271.aspx.
- O. George, “Ultimate wireless security guide: an introduction to LEAP authentication,” Tech. Rep., 2007.
- D. P. Jablon, “Strong password-only authenticated key exchange,” ACM SIGCOMM Computer Communication Review, vol. 26, no. 5, pp. 5–26, 1996.
- C. Lai, H. Li, R. Lu, X. Shen, and J. Cao, “A unified end-to-end security scheme for machine-type communication in lte networks,” in Proceedings of the 2nd IEEE/CIC International Conference on Communications in China (ICCC '13), pp. 1–6, 2013.
- H. H. Ngo, X. Wu, P. D. Le, and B. Srinivasan, “An individual and group authentication model for wireless network services,” Journal of Convergence Information Technology, vol. 5, no. 1, pp. 82–94, 2010.
- Y.-W. Chen, J.-T. Wang, K.-H. Chi, and C.-C. Tseng, “Group-based authentication and key agreement,” Wireless Personal Communications, vol. 62, no. 4, pp. 965–979, 2012.
- N. Aboudagga, J.-J. Quisquater, and M. Eltoweissy, “Group authentication protocol for mobile networks,” in Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob '07), White Plains, NY, USA, October 2007.
- H. Mun, K. Han, and K. Kim, “3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA,” in Proceedings of the Wireless Telecommunications Symposium (WTS '09), pp. 1–8, Prague, Czech Republic, April 2009.
- Mathcam, “PlanetMath-Elliptic Curve Diffie-Hellman key exchange,” http://planetmath.org/DiffieHellmanKeyExchange.
- N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987.
- V. S. Miller, “Use of elliptic curves in cryptography,” in Proceedings of the Advances in Cryptology (CRYPTO ’85), pp. 417–426, Springer, 1986.
- E. B. Barker, D. Johnson, and M. E. Smid, “SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised),” 2007.
- T. A. Team, “AVISPA v1. 1 User Manual 2006,” http://avispa-project.org/.