scholarly journals A secure group based authentication protocol for machine to machine communications in LTE-WLAN interworking architecture

Author(s):  
Mariya Ouaissa ◽  
Abdallah Rhattoy

Machine to Machine (M2M) communication has been used in applications such as telemetry, industry, automation and health. Support for a large number of devices has been considered an essential requirement in M2M communications. During this time, security is the most important challenge; M2M cannot access secure networks through effective authentication, all relevant M2M applications cannot be accepted. The challenge of M2M research is authentication by the group when a large number of M2M devices simultaneously accessing the network will cause severe authentication signaling congestion. The group based model under an M2M architecture, especially when the Machine Type Communication (MTC) devices belong to the non 3rd Generation Partnership Project (3GPP) network, will face a new challenge of access authentication. In this paper, we propose a group based authentication and key agreement protocol for machine type communications combining Elliptic Curve based Diffie-Hellman (ECDH) on the Extensible Authentication Protocol (EAP). Compared to EAP-AKA and other existing authentication protocols, our solution provides increased security against various malicious activities and better performance in terms of signaling overhead, bandwidth consumption and transmission cost.

2019 ◽  
Vol 31 (3) ◽  
pp. 83-96
Author(s):  
Xin Chen ◽  
ZhiQiang Liu ◽  
Jianxiong Wan ◽  
Zhuo Li

Nowadays, the technology of internet of things is developing rapidly, and the application of machine type communication (MTC) is becoming more and more extensive. Meanwhile, the 3rd generation partnership project (3GPP) organization proposes a standard architecture for MTC in LTE-A networks. However, when a large number of MTC devices handover authentication at the same time, the use of 3GPP handover mechanisms takes up more signaling resources, which will cause signaling congestion and vulnerable attacks. To solve this problem, the researchers propose an aggregated handover authentication protocol for MTC in LTE-A networks. Compared with the current 3GPP standards, the scheme can not only avoid signaling congestion, but also support more security. Finally, the researchers use colored petri nets (CPN) to model and analyze the proposed protocol. Simulation results show that the protocol is secure and achievable.


Author(s):  
Thulitha Senevirathna ◽  
Bathiya Thennakoon ◽  
Tharindu Sankalpa ◽  
Chatura Seneviratne ◽  
Samad Ali ◽  
...  

Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 116
Author(s):  
Wissal Ben Ameur ◽  
Philippe Mary ◽  
Jean-François Hélard ◽  
Marion Dumay ◽  
Jean Schwoerer

Non-orthogonal multiple access schemes with grant free access have been recently highlighted as a prominent solution to meet the stringent requirements of massive machine-type communications (mMTCs). In particular, the multi-user shared access (MUSA) scheme has shown great potential to grant free access to the available resources. For the sake of simplicity, MUSA is generally conducted with the successive interference cancellation (SIC) receiver, which offers a low decoding complexity. However, this family of receivers requires sufficiently diversified received user powers in order to ensure the best performance and avoid the error propagation phenomenon. The power allocation has been considered as a complicated issue especially for a decentralized decision with a minimum signaling overhead. In this paper, we propose a novel algorithm for an autonomous power decision with a minimal overhead based on a tight approximation of the bit error probability (BEP) while considering the error propagation phenomenon. We investigate the efficiency of multi-armed bandit (MAB) approaches for this problem in two different reward scenarios: (i) in Scenario 1, each user reward only informs about whether its own packet was successfully transmitted or not; (ii) in Scenario 2, each user reward may carry information about the other interfering user packets. The performances of the proposed algorithm and the MAB techniques are compared in terms of the successful transmission rate. The simulation results prove that the MAB algorithms show a better performance in the second scenario compared to the first one. However, in both scenarios, the proposed algorithm outperforms the MAB techniques with a lower complexity at user equipment.


Author(s):  
Byung-Hyun Lee ◽  
Hyun-Suk Lee ◽  
Seokjae Moon ◽  
Jang-Won Lee

Sign in / Sign up

Export Citation Format

Share Document