Aggregated Handover Authentication for Machine Type Communication

2019 ◽  
Vol 31 (3) ◽  
pp. 83-96
Author(s):  
Xin Chen ◽  
ZhiQiang Liu ◽  
Jianxiong Wan ◽  
Zhuo Li

Nowadays, the technology of internet of things is developing rapidly, and the application of machine type communication (MTC) is becoming more and more extensive. Meanwhile, the 3rd generation partnership project (3GPP) organization proposes a standard architecture for MTC in LTE-A networks. However, when a large number of MTC devices handover authentication at the same time, the use of 3GPP handover mechanisms takes up more signaling resources, which will cause signaling congestion and vulnerable attacks. To solve this problem, the researchers propose an aggregated handover authentication protocol for MTC in LTE-A networks. Compared with the current 3GPP standards, the scheme can not only avoid signaling congestion, but also support more security. Finally, the researchers use colored petri nets (CPN) to model and analyze the proposed protocol. Simulation results show that the protocol is secure and achievable.

Author(s):  
Mariya Ouaissa ◽  
Abdallah Rhattoy

Machine to Machine (M2M) communication has been used in applications such as telemetry, industry, automation and health. Support for a large number of devices has been considered an essential requirement in M2M communications. During this time, security is the most important challenge; M2M cannot access secure networks through effective authentication, all relevant M2M applications cannot be accepted. The challenge of M2M research is authentication by the group when a large number of M2M devices simultaneously accessing the network will cause severe authentication signaling congestion. The group based model under an M2M architecture, especially when the Machine Type Communication (MTC) devices belong to the non 3rd Generation Partnership Project (3GPP) network, will face a new challenge of access authentication. In this paper, we propose a group based authentication and key agreement protocol for machine type communications combining Elliptic Curve based Diffie-Hellman (ECDH) on the Extensible Authentication Protocol (EAP). Compared to EAP-AKA and other existing authentication protocols, our solution provides increased security against various malicious activities and better performance in terms of signaling overhead, bandwidth consumption and transmission cost.


As we know, world is moving into the era of modern digital technology and looking forward tomassive machine type communications (mMTC), whichis an integral part of Internet of Things (IoT). The current technologysupporting mMTC market are not standardized; therefore, there are many short comings from physical layer which includes complexity in deployment, poor reliability, lesser flexibility, security threats and high maintenance cost. To address all these challenges in 5G machine type communication (MTC), the 3rdGeneration Partnership Project (3GPP) in release 13has standardizedNarrowband Internet of Things (NB-IoT) as a better choice in deployment of 5G MTC. NB-IoT has been recommended by ITU as a 5G standard and this recognition of NB-IoT as a core technology in massive machine type communication will impact the telecommunication industry. NB-IoT mainly works on low power wide area networks (LPWAN), which isconsidered as a major technology driver in 5G wireless technologies. Initially,we have compared a spectrum power of NB-IoT with W-Fi ac considering their own bandwidthand specificationsas per 3GPP and IEEE 802.11,respectively.As per analysis, we found many advantages of deploying NB-IoT in 5thgeneration wireless technology including ubiquitous coverage, low power consumption, less transmission power and better interference rejection. Considering thisfact of NB-IoT, we proposedand design a NB-IoT uplink systemusing NPUSCH, UL-SCH and UL-DMRS as per 3GPP 5G specificationsand performance analysis has been carried out


2019 ◽  
Vol 3 (1) ◽  
pp. 48-59
Author(s):  
Tingting Xia ◽  
Michael Mao Wang ◽  
Chengling Jiang ◽  
Jingjing Zhang ◽  
Lei Wang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document