Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 6854612, 16 pages
https://doi.org/10.1155/2018/6854612
Research Article

UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks

1School of Cyber Engineering, State Key Laboratory of Integrated Service Network, Xidian University, Xi’an, China
2School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore
3State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

Correspondence should be addressed to Jin Cao; moc.621@798joac

Received 27 July 2017; Revised 2 January 2018; Accepted 18 January 2018; Published 28 February 2018

Academic Editor: Tom Chen

Copyright © 2018 Jin Cao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. 3rd Generation Partnership Project, “Technical Specification Group Radio Access Network; Study on RAN Improvements for Machine-type Communications (Rel 11),” Tech. Rep., 2011, 3GPP TR 37.868 V12.0.0. View at Google Scholar
  2. I. F. Akyildiz, D. M. Gutierrez-Estevez, R. Balakrishnan, and E. Chavarria-Reyes, “LTE-advanced and the evolution to beyond 4G (B4G) systems,” Physical Communication, vol. 10, pp. 31–60, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. N. Nikaein and S. Krea, “Latency for Real-Time Machine-to-Machine Communication in LTE-Based System Architecture,” in Proceedings of Sustainable Wireless Technologies Wireless Conference, pp. 1–6, 2011.
  4. A. Zanella, M. Zorzi, A. F. Dos Santos et al., “M2M massive wireless access: challenges, research issues, and ways forward,” in Proceedings of the IEEE Globecom Workshops (GC Wkshps '13), pp. 151–156, USA, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Cao, M. Ma, and H. Li, “A group-based authentication and key agreement for MTC in LTE networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM '12), pp. 1017–1022, Anaheim, Calif, USA, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. 3rd Generation Partnership Project, “Technical Specification Group Services and System Aspects; Security Sspects of Machine-Type Communications (Rel 12),” Tech. Rep., 2014, 3GPP TR 33.868 V12.1.0. View at Google Scholar
  7. 3rd Generation Partnership Project, “Technical Specification Group Services and System Aspects; General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access (Rel 14),” Tech. Rep., 2016, 3GPP TS 23.401 V14.0.0. View at Google Scholar
  8. 3rd Generation Partnership Project, “Technical Specification Group Radio Access Network,” Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; (Rel 13), 2016, 3GPP TS 36.300 V13.4.0. View at Google Scholar
  9. 3rd Generation Partnership Project, “Technical Specification Group Service and System Aspects,” 3GPP System Architecture Evolution (SAE); Security architecture (Rel 13), 2016, 3GPP TS 33.401 V13.3.0. View at Google Scholar
  10. J. Cao, H. Li, M. Ma, Y. Zhang, and C. Lai, “A simple and robust handover authentication between HeNB and eNB in LTE networks,” Computer Networks, vol. 56, no. 8, pp. 2119–2131, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. D. Forsberg, “LTE key management analysis with session keys context,” Computer Communications, vol. 33, no. 16, pp. 1907–1915, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. 3rd Generation Partnership Project, “Technical Specification Group Service and System Aspects,” Security of H(e)NB; (Rel 8), 2009, 3GPP TR 33.820 V8.3.0. View at Google Scholar
  13. C.-K. Han, H.-K. Choi, and I.-H. Kim, “Building femtocell more secure with improved proxy signature,” in Proceedings of the 2009 IEEE Global Telecommunications Conference, GLOBECOM 2009, USA, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. H. Nicanfar, J. Hajipour, F. Agharebparast, P. TalebiFard, and V. C. M. Leung, “Privacy-preserving handover mechanism in 4G,” in Proceedings of the 1st IEEE International Conference on Communications and Network Security, CNS 2013, pp. 373-374, USA, October 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Cao, M. Ma, H. Li, Y. Zhang, and Z. Luo, “A survey on security aspects for LTE and LTE-A networks,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 283–302, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Service Requirements for Machine-Type Communications (MTC) (Rel 13), 3GPP TS 22.368 V13.1.0, Dec. 2014.
  17. J. Cao, H. Li, M. Ma, and F. Li, “UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks,” in Proceedings of the IEEE International Conference on Communications, ICC 2015, pp. 7246–7251, UK, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. A. Fu, S. Lan, B. Huang, Z. Zhu, and Y. Zhang, “A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks,” IEEE Communications Letters, vol. 16, no. 11, pp. 1744–1747, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. C. Lai, H. Li, R. Lu, R. Jiang, and X. Shen, “SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks,” in Proceedings of the 2014 1st IEEE International Conference on Communications, ICC 2014, pp. 1011–1016, Australia, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. J. Cao, H. Li, and M. Ma, “GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks,” in Proceedings of the IEEE International Conference on Communications, ICC 2015, pp. 3020–3025, UK, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  21. Q. Kong, R. Lu, S. Chen, and H. Zhu, “Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks,” IEEE Internet of Things Journal, vol. 4, no. 1, pp. 29–39, 2017. View at Publisher · View at Google Scholar · View at Scopus
  22. K. Itakura and K. Nakamura, “A public-key cryptosystem suitable for digital multisignatures,” NEC Research and Development, vol. 71, pp. 1–8, 1983. View at Google Scholar · View at Scopus
  23. S.-J. Hwang and Y.-H. Lee, “Repairing ElGamal-like multi-signature schemes using self-certified public keys,” Applied Mathematics and Computation, vol. 156, no. 1, pp. 73–83, 2004. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. J. Katz and A. Y. Lindell, “Aggregate Message Authentication Codes,” in Topics in Cryptology CT-RSA, pp. 155–169, Springer Berlin Heidelberg, Berlin, Heidelberg, 2008. View at Publisher · View at Google Scholar
  25. R. Canetti and H. Krawczyk, “Analysis of key-exchange protocols and their use for building secure channels,” in Advances in Cryptology EUROCRYPT, vol. 2045 of Lecture Notes in Comput. Sci., pp. 453–474, Springer, Berlin, 2001. View at Publisher · View at Google Scholar · View at MathSciNet
  26. K.-R. Jung, A. Park, and S. Lee, “Machine-Type-Communication (MTC) device grouping algorithm for congestion avoidance of MTC oriented LTE network,” Communications in Computer and Information Science, vol. 78, pp. 167–178, 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Network Domain Security (NDS); IP network layer security (Rel 13), 3GPP TS 33.210 V13.0.0, Dec. 2015.
  28. E. Bresson, O. Chevassut, and D. Pointcheval, “Dynamic group Diffie-Hellman key exchange under standard assumptions,” in Advances in Cryptology—EUROCRYPT, vol. 2332 of Lecture Notes in Comput. Sci., pp. 321–336, Springer, Berlin, 2002. View at Publisher · View at Google Scholar · View at MathSciNet
  29. AVISPA v1.1 User Manual, 2006.
  30. Y. Glouche, T. Genet, O. Heen, and O. Courtay, “A Security Protocol Animator Tool for AVISPA,” ARTIST2 Workshop on Security Specification and Verification of Embedded Systems, 2006. View at Google Scholar
  31. L. Lamport, “Specifying Systems,” in The TLA+ Language and Tools for Hardware and Software Engineers, Addison-Wesley Publishing Company, 2002. View at Google Scholar