• DocumentCode
    647157
  • Title

    A unified end-to-end security scheme for machine-type communication in LTE networks

  • Author

    Chengzhe Lai ; Hui Li ; Rongxing Lu ; Shen, Xuemin Sherman ; Jin Cao

  • Author_Institution
    State Key Lab. of Integrated Services Networks, Xidian Univ., Xi´an, China
  • fYear
    2013
  • fDate
    12-14 Aug. 2013
  • Firstpage
    698
  • Lastpage
    703
  • Abstract
    With a wide range of potential applications, machine-type communication (MTC) or machine to machine (M2M) communications is gaining a tremendous interest among mobile network operators and research groups. MTC is standardized by the 3rd Generation Partnership Project (3GPP), which has been regarded as the promising solution facilitating M2M communications. One of research challenges in MTC is security, if the security is not well addressed, all applications involving MTC cannot be put into market. In the latest standard, the 3GPP proposes a novel scenario for MTC, where MTC server is located outside of the operator domain. However, the connection between 3GPP core network and MTC server in this scenario is insecure, as a result, there are distrustful relationships among MTC device, core network and MTC server. To resolve this problem, we propose an end-to-end security scheme for MTC based on the proxy-signature technique in this paper. Specifically, both the MTC device and the MTC server can establish a strong trustful relationship with each other through using the proxy signatures issued by the core network. Through security analysis, we conclude that the proposed scheme can achieve the security goals, and prevent the various security threats. In addition, performance evaluation also demonstrates its efficiency in terms of operational cost during authentication.
  • Keywords
    3G mobile communication; Long Term Evolution; next generation networks; telecommunication security; 3GPP; 3rd Generation Partnership Project; LTE networks; core network; machine to machine communications; machine type communication; mobile network operators; proxy signature technique; unified end to end security scheme; Authentication; Equations; Performance evaluation; Public key; Radio access networks; Servers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications in China (ICCC), 2013 IEEE/CIC International Conference on
  • Conference_Location
    Xi´an
  • Type

    conf

  • DOI
    10.1109/ICCChina.2013.6671201
  • Filename
    6671201