scispace - formally typeset
Journal ArticleDOI

Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks

TLDR
A secure handover session key management scheme via mobile relay in LTE-A networks that can successfully establish session keys between the on-board UEs and their connected DeNB, achieving backward and forward key separations, and resisting against the collusion between the MRN and the DeNB as the same time.
Abstract
Internet of Things is expanding the network by integrating huge amount of surrounding objects which requires the secure and reliable transmission of the high volume data generation, and the mobile relay technique is one of the efficient ways to meet the on-board data explosion in LTE-Advanced (LTE-A) networks. However, the practice of the mobile relay will pose potential threats to the information security during the handover process. Therefore, to address this challenge, in this paper, we propose a secure handover session key management scheme via mobile relay in LTE-A networks. Specifically, in the proposed scheme, to achieve forward and backward key separations, the session key shared between the on-board user equipment (UE) and the connected donor evolved node B (DeNB) is first generated by the on-board UE and then securely distributed to the DeNB. Furthermore, to reduce the communication overhead and the computational complexity, a novel proxy re-encryption technique is employed, where the session keys initially encrypted with the public key of the mobility management entity (MME) will be re-encrypted by a mobile relay node (MRN), so that other DeNBs can later decrypt the session keys with their own private keys while without the direct involvement of the MME. Detailed security analysis shows that the proposed scheme can successfully establish session keys between the on-board UEs and their connected DeNB, achieving backward and forward key separations, and resisting against the collusion between the MRN and the DeNB as the same time. In addition, performance evaluations via extensive simulations are carried out to demonstrate the efficiency and effectiveness of the proposed scheme.

read more

Citations
More filters
Journal ArticleDOI

A Survey on Security Aspects for 3GPP 5G Networks

TL;DR: An overview of the network architecture and security functionality of the 3GPP 5G networks is presented, and the new features and techniques including the support of massive Internet of Things (IoT) devices, Device to Device (D2D) communication, Vehicle to Everything (V2X), and network slice are focused on.
Journal ArticleDOI

Privacy-Preserving Content Dissemination for Vehicular Social Networks: Challenges and Solutions

TL;DR: The privacy issues for content dissemination in the current VSN architecture are analyzed and classified according to their features, and various privacy-preserving content dissemination schemes, attempting to resist distinct attacks, are discussed.
Journal ArticleDOI

FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks

TL;DR: Two fixed-trajectory group pre-handover authentication schemes for MRN are proposed: the first proposed scheme FTGPHA1 which establishes most of the important security properties and costs low handover overheads, and the second proposed schemeFTGPHA2 which furnishes better security properties than the first one.
Journal ArticleDOI

SDN-Based Handover Authentication Scheme for Mobile Edge Computing in Cyber-Physical Systems

TL;DR: A novel and efficient software-defined networking (SDN)-based handover authentication scheme for MEC in CPS (SHAS) that can get mutual authentication and secret key confidentiality with a strong anti-attack ability is proposed.
Posted Content

Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey

TL;DR: Comparisons of state-the-art solutions for IoT which are applicable toSecurity, privacy, and trust in smart and connected M-IoT networks are presented and various challenges, applications, advantages, technologies, standards, open issues, and roadmap for security, privacy and trust are discussed.
References
More filters
Journal ArticleDOI

The Internet of Things: A survey

TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI

Internet of Things (IoT): A vision, architectural elements, and future directions

TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI

The internet of things: a survey

TL;DR: The definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed and the major challenges which need addressing by the research community and corresponding potential solutions are investigated.
Journal ArticleDOI

Two-factor user authentication in wireless sensor networks

TL;DR: This letter presents a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.
Proceedings ArticleDOI

jPBC: Java pairing based cryptography

TL;DR: al. as discussed by the authors presented jPBC, a Java port of the PBC library written in C. This library supports different types of elliptic curves, preprocessing which can speedup the computation significantly and it is ready for the mobile world.
Related Papers (5)