DocumentCode :
647157
Title :
A unified end-to-end security scheme for machine-type communication in LTE networks
Author :
Chengzhe Lai ; Hui Li ; Rongxing Lu ; Shen, Xuemin Sherman ; Jin Cao
Author_Institution :
State Key Lab. of Integrated Services Networks, Xidian Univ., Xi´an, China
fYear :
2013
fDate :
12-14 Aug. 2013
Firstpage :
698
Lastpage :
703
Abstract :
With a wide range of potential applications, machine-type communication (MTC) or machine to machine (M2M) communications is gaining a tremendous interest among mobile network operators and research groups. MTC is standardized by the 3rd Generation Partnership Project (3GPP), which has been regarded as the promising solution facilitating M2M communications. One of research challenges in MTC is security, if the security is not well addressed, all applications involving MTC cannot be put into market. In the latest standard, the 3GPP proposes a novel scenario for MTC, where MTC server is located outside of the operator domain. However, the connection between 3GPP core network and MTC server in this scenario is insecure, as a result, there are distrustful relationships among MTC device, core network and MTC server. To resolve this problem, we propose an end-to-end security scheme for MTC based on the proxy-signature technique in this paper. Specifically, both the MTC device and the MTC server can establish a strong trustful relationship with each other through using the proxy signatures issued by the core network. Through security analysis, we conclude that the proposed scheme can achieve the security goals, and prevent the various security threats. In addition, performance evaluation also demonstrates its efficiency in terms of operational cost during authentication.
Keywords :
3G mobile communication; Long Term Evolution; next generation networks; telecommunication security; 3GPP; 3rd Generation Partnership Project; LTE networks; core network; machine to machine communications; machine type communication; mobile network operators; proxy signature technique; unified end to end security scheme; Authentication; Equations; Performance evaluation; Public key; Radio access networks; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications in China (ICCC), 2013 IEEE/CIC International Conference on
Conference_Location :
Xi´an
Type :
conf
DOI :
10.1109/ICCChina.2013.6671201
Filename :
6671201
Link To Document :
بازگشت