PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks
暂无分享,去创建一个
[1] Kyung-Yong Chung,et al. Performance analysis of LTE downlink system using relay-based selective transmission , 2013, Personal and Ubiquitous Computing.
[2] Mostafa M. Fouda,et al. An efficient distributed approach for key management in microgrids , 2015, 2015 11th International Computer Engineering Conference (ICENCO).
[3] Rohit Vaid,et al. Analysis of Existing Protocols in WSN Based on Key Parameters , 2018, Proceedings of 2nd International Conference on Communication, Computing and Networking.
[4] Ayman I. Kayssi,et al. Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[5] R. Manoharan,et al. A Robust Secure DS-AKA with Mutual Authentication for LTE-A , 2015 .
[6] Anurag Agarwal,et al. The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.
[7] Aboubaker Lasebae,et al. Providing Security in 4G Systems: Unveiling the Challenges , 2010, 2010 Sixth Advanced International Conference on Telecommunications.
[8] Woo-Sik Bae. Designing and verifying a P2P service security protocol in M2M environment , 2016, Peer Peer Netw. Appl..
[9] Vanga Odelu,et al. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.
[10] Geir M. Køien. Mutual entity authentication for LTE , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[11] Rachid Elkouch,et al. Security analysis of LTE/SAE networks over E-UTRAN , 2016, 2016 International Conference on Information Technology for Organizations Development (IT4OD).
[12] Taejoon Park,et al. A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.
[13] Jaeho Kim,et al. M2M Service Platforms: Survey, Issues, and Enabling Technologies , 2014, IEEE Communications Surveys & Tutorials.
[14] Xuemin Shen,et al. SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.
[15] Gang Wang,et al. Resource allocation for M2M-enabled cellular network using Nash bargaining game theory , 2018, Peer-to-Peer Netw. Appl..
[16] Yucheng Zhang,et al. A novel 3GPP SAE authentication and key agreement protocol , 2009, 2009 IEEE International Conference on Network Infrastructure and Digital Content.
[17] Martín Abadi,et al. Authentication: A Practical Study in Belief and Action , 1988, TARK.
[18] Alessandro Neri,et al. Security Protocols for IoT Access Networks , 2016 .
[19] Jeffrey G. Andrews,et al. An Overview on 3GPP Device-to-Device Proximity Services , 2013, 1310.0116.
[20] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[21] Mohit Gupta,et al. Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit , 2019, Ad Hoc Networks.
[22] Hsiao-Hwa Chen,et al. M2M Communications in 3GPP LTE/LTE-A Networks: Architectures, Service Requirements, Challenges, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[23] Raed A. Abd-Alhameed,et al. Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.
[24] Victor Fajardo,et al. Diameter Base Protocol , 2003, RFC.
[25] Ayman I. Kayssi,et al. A privacy-enhanced computationally-efficient and comprehensive LTE-AKA , 2017, Comput. Commun..
[26] Min-Shiang Hwang,et al. A cocktail protocol with the Authentication and Key Agreement on the UMTS , 2010, J. Syst. Softw..
[27] Basav Roychoudhury,et al. Enhancing User Identity Privacy in LTE , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[28] Songwu Lu,et al. Can we pay for what we get in 3G data access? , 2012, Mobicom '12.
[29] Yongjun Wang,et al. Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[30] Donghoon Lee,et al. Performance and security enhanced authentication and key agreement protocol for SAE/LTE network , 2016, Comput. Networks.
[31] Mark A. Gregory,et al. A green and secure authentication for the 4th generation mobile network , 2011, 2011 Australasian Telecommunication Networks and Applications Conference (ATNAC).
[32] L. Kamoun,et al. Authentication protocol in fourth generation wireless networks , 2009, 2009 IFIP International Conference on Wireless and Optical Communications Networks.
[33] Minyi Guo,et al. Optimizing power consumption of mobile devices for video streaming over 4G LTE networks , 2017, Peer-to-Peer Networking and Applications.
[34] Fagen Li,et al. User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System , 2016, Int. J. Netw. Secur..
[35] Ion Bica,et al. Security Analysis of LTE Access Network , 2011, ICON 2011.
[36] Won-Gyu Lee,et al. Development and application of internet of things educational tool based on peer to peer network , 2017, Peer-to-Peer Networking and Applications.
[37] Ion Bica,et al. A J-PAKE based solution for secure authentication in a 4G network , 2011 .
[38] Neetesh Saxena,et al. Authentication Protocol for an IoT-Enabled LTE Network , 2016, ACM Trans. Internet Techn..
[39] Einar Snekkenes,et al. On The Formal Analysis of PKCS Authentication Protocols , 1990, AUSCRYPT.
[40] Jin Cao,et al. A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.
[41] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[42] Jin Cao,et al. A novel group access authentication and key agreement protocol for machine‐type communication , 2015, Trans. Emerg. Telecommun. Technol..
[43] Xiaohu Tang,et al. AKA and Authorization Scheme for 4G Mobile Networks Based on Trusted Mobile Platform , 2005, 2005 5th International Conference on Information Communications & Signal Processing.
[44] Nicolas Sklavos,et al. LTE/SAE Security Issues on 4G Wireless Networks , 2013, IEEE Security & Privacy.
[45] Hong Wang,et al. EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications , 2013, Int. J. Distributed Sens. Networks.
[46] Jaeho Kim,et al. Towards the oneM2M standards for building IoT ecosystem: Analysis, implementation and lessons , 2018, Peer Peer Netw. Appl..
[47] Masoumeh Purkhiabani. Enhanced Authentication and Key Agreement Procedureof Next Generation 3GPP Mobile Networks , 2012 .
[48] Mohammad Hesam Tadayon,et al. A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid , 2018, IEEE Transactions on Smart Grid.