SRGH: A secure and robust group‐based handover AKA protocol for MTC in LTE‐A networks

[1]  Dan Forsberg,et al.  LTE key management analysis with session keys context , 2010, Comput. Commun..

[2]  Jin Cao,et al.  GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[3]  Xuemin Shen,et al.  SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[4]  Sha Hu,et al.  Technology classification, industry, and education for Future Internet of Things , 2012, Int. J. Commun. Syst..

[5]  Jaime Lloret,et al.  Adaptive video streaming testbed design for performance study and assessment of QoE , 2018, Int. J. Commun. Syst..

[6]  Kefei Chen,et al.  Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation , 2017, Science China Information Sciences.

[7]  Bilal Beldjilali,et al.  Secure IoT solution for wearable health care applications, case study Electric Imp development platform , 2018, Int. J. Commun. Syst..

[8]  Timothy A. Thomas,et al.  LTE-advanced: next-generation wireless broadband technology [Invited Paper] , 2010, IEEE Wireless Communications.

[9]  Narendra S. Chaudhari,et al.  DGBES: Dynamic Group Based Efficient and Secure Authentication and Key Agreement Protocol for MTC in LTE/LTE-A Networks , 2018, Wirel. Pers. Commun..

[10]  Jin Cao,et al.  A simple and robust handover authentication between HeNB and eNB in LTE networks , 2012, Comput. Networks.

[11]  Jin Cao,et al.  EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks , 2018, J. Netw. Comput. Appl..

[12]  Hamid Aghvami,et al.  A Framework for Unified Spectrum Management (USM) in Heterogeneous Wireless Networks , 2007, IEEE Communications Magazine.

[13]  Stefan Parkvall,et al.  LTE: the evolution of mobile broadband , 2009, IEEE Communications Magazine.

[14]  Anmin Fu,et al.  GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks , 2013, Wirel. Pers. Commun..

[15]  Joel J. P. C. Rodrigues,et al.  Design and deployment of a smart system for data gathering in aquaculture tanks using wireless sensor networks , 2017, Int. J. Commun. Syst..

[16]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[17]  Jin Cao,et al.  G2RHA:Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks , 2017, IEEE Transactions on Vehicular Technology.

[18]  Narendra S. Chaudhari,et al.  SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network , 2018, IEEE Access.

[19]  Sungwon Lee,et al.  Machine-Type-Communication (MTC) Device Grouping Algorithm for Congestion Avoidance of MTC Oriented LTE Network , 2010, SUComS.

[20]  Tatsuaki Okamoto,et al.  A digital multisignature scheme using bijective public-key cryptosystems , 1988, TOCS.

[21]  Anmin Fu,et al.  Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks , 2017, Wirel. Networks.

[22]  Antonios Argyriou,et al.  Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..

[23]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[24]  Neetesh Saxena,et al.  ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks , 2015, Wirel. Pers. Commun..

[25]  Walaa Hamouda,et al.  Cellular LTE-A Technologies for the Future Internet-of-Things: Physical Layer Features and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[26]  Jinde Cao,et al.  Special focus on distributed cooperative analysis, control and optimization in networks , 2017, Science China Information Sciences.

[27]  Jin Li,et al.  Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.

[28]  Bo Huang,et al.  A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks , 2012, IEEE Communications Letters.

[29]  Hugo Krawczyk,et al.  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.

[30]  Gerhard P. Hancke,et al.  A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges , 2018, IEEE Access.

[31]  Navid Nikaein,et al.  Latency for Real-Time Machine-to-Machine Communication in LTE-Based System Architecture , 2011, EW.

[32]  Maode Ma,et al.  A proxy signature-based handover authentication scheme for LTE wireless networks , 2017, J. Netw. Comput. Appl..

[33]  Jin Cao,et al.  UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[34]  Armin Dekorsy,et al.  M2M massive wireless access: Challenges, research issues, and ways forward , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).