DocumentCode
647157
Title
A unified end-to-end security scheme for machine-type communication in LTE networks
Author
Chengzhe Lai ; Hui Li ; Rongxing Lu ; Shen, Xuemin Sherman ; Jin Cao
Author_Institution
State Key Lab. of Integrated Services Networks, Xidian Univ., Xi´an, China
fYear
2013
fDate
12-14 Aug. 2013
Firstpage
698
Lastpage
703
Abstract
With a wide range of potential applications, machine-type communication (MTC) or machine to machine (M2M) communications is gaining a tremendous interest among mobile network operators and research groups. MTC is standardized by the 3rd Generation Partnership Project (3GPP), which has been regarded as the promising solution facilitating M2M communications. One of research challenges in MTC is security, if the security is not well addressed, all applications involving MTC cannot be put into market. In the latest standard, the 3GPP proposes a novel scenario for MTC, where MTC server is located outside of the operator domain. However, the connection between 3GPP core network and MTC server in this scenario is insecure, as a result, there are distrustful relationships among MTC device, core network and MTC server. To resolve this problem, we propose an end-to-end security scheme for MTC based on the proxy-signature technique in this paper. Specifically, both the MTC device and the MTC server can establish a strong trustful relationship with each other through using the proxy signatures issued by the core network. Through security analysis, we conclude that the proposed scheme can achieve the security goals, and prevent the various security threats. In addition, performance evaluation also demonstrates its efficiency in terms of operational cost during authentication.
Keywords
3G mobile communication; Long Term Evolution; next generation networks; telecommunication security; 3GPP; 3rd Generation Partnership Project; LTE networks; core network; machine to machine communications; machine type communication; mobile network operators; proxy signature technique; unified end to end security scheme; Authentication; Equations; Performance evaluation; Public key; Radio access networks; Servers;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications in China (ICCC), 2013 IEEE/CIC International Conference on
Conference_Location
Xi´an
Type
conf
DOI
10.1109/ICCChina.2013.6671201
Filename
6671201
Link To Document