SRGH: A secure and robust group‐based handover AKA protocol for MTC in LTE‐A networks
暂无分享,去创建一个
[1] Dan Forsberg,et al. LTE key management analysis with session keys context , 2010, Comput. Commun..
[2] Jin Cao,et al. GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[3] Xuemin Shen,et al. SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[4] Sha Hu,et al. Technology classification, industry, and education for Future Internet of Things , 2012, Int. J. Commun. Syst..
[5] Jaime Lloret,et al. Adaptive video streaming testbed design for performance study and assessment of QoE , 2018, Int. J. Commun. Syst..
[6] Kefei Chen,et al. Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation , 2017, Science China Information Sciences.
[7] Bilal Beldjilali,et al. Secure IoT solution for wearable health care applications, case study Electric Imp development platform , 2018, Int. J. Commun. Syst..
[8] Timothy A. Thomas,et al. LTE-advanced: next-generation wireless broadband technology [Invited Paper] , 2010, IEEE Wireless Communications.
[9] Narendra S. Chaudhari,et al. DGBES: Dynamic Group Based Efficient and Secure Authentication and Key Agreement Protocol for MTC in LTE/LTE-A Networks , 2018, Wirel. Pers. Commun..
[10] Jin Cao,et al. A simple and robust handover authentication between HeNB and eNB in LTE networks , 2012, Comput. Networks.
[11] Jin Cao,et al. EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks , 2018, J. Netw. Comput. Appl..
[12] Hamid Aghvami,et al. A Framework for Unified Spectrum Management (USM) in Heterogeneous Wireless Networks , 2007, IEEE Communications Magazine.
[13] Stefan Parkvall,et al. LTE: the evolution of mobile broadband , 2009, IEEE Communications Magazine.
[14] Anmin Fu,et al. GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks , 2013, Wirel. Pers. Commun..
[15] Joel J. P. C. Rodrigues,et al. Design and deployment of a smart system for data gathering in aquaculture tanks using wireless sensor networks , 2017, Int. J. Commun. Syst..
[16] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[17] Jin Cao,et al. G2RHA:Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks , 2017, IEEE Transactions on Vehicular Technology.
[18] Narendra S. Chaudhari,et al. SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network , 2018, IEEE Access.
[19] Sungwon Lee,et al. Machine-Type-Communication (MTC) Device Grouping Algorithm for Congestion Avoidance of MTC Oriented LTE Network , 2010, SUComS.
[20] Tatsuaki Okamoto,et al. A digital multisignature scheme using bijective public-key cryptosystems , 1988, TOCS.
[21] Anmin Fu,et al. Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks , 2017, Wirel. Networks.
[22] Antonios Argyriou,et al. Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..
[23] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[24] Neetesh Saxena,et al. ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks , 2015, Wirel. Pers. Commun..
[25] Walaa Hamouda,et al. Cellular LTE-A Technologies for the Future Internet-of-Things: Physical Layer Features and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[26] Jinde Cao,et al. Special focus on distributed cooperative analysis, control and optimization in networks , 2017, Science China Information Sciences.
[27] Jin Li,et al. Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.
[28] Bo Huang,et al. A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks , 2012, IEEE Communications Letters.
[29] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[30] Gerhard P. Hancke,et al. A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges , 2018, IEEE Access.
[31] Navid Nikaein,et al. Latency for Real-Time Machine-to-Machine Communication in LTE-Based System Architecture , 2011, EW.
[32] Maode Ma,et al. A proxy signature-based handover authentication scheme for LTE wireless networks , 2017, J. Netw. Comput. Appl..
[33] Jin Cao,et al. UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[34] Armin Dekorsy,et al. M2M massive wireless access: Challenges, research issues, and ways forward , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).