Skip to main content
Log in

End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Machine Type Communication (MTC) and its related services have become the new business growth-point of mobile communication. However, application market with the size of about a hundred of million makes end-to-end security facing grand challenges, especially the repeated construction of authentication facilities for different applications. According to features of MTC, an end-to-end security scheme is proposed, which is based on the Generic Authentication Architecture (GAA), and is thus suitable for MTC communication in application layer. User authentication and session key agreement are achieved by the assistance of operator network in this scheme. Hence, the MTC server can only focus on service delivery. Performance of the proposal is also analyzed, and from this procedure, we obtain the function of lifetime of master session key against expected number of bootstrapping request. Finally, it is shown how the operator could set an optimized lifetime of master session key.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Cellular Machine to Machine (M2M) modules Market (2012–2017): 6Wresearch, May 2012. http://www.6wresearch.com/

  2. Chalouf, M.A., Djama, I., Ahmed, T., Krief, F.: An end-to-end QoS and security joint management for IPTV service delivery. In: Proceeding of IJAACS, pp. 398–416 (2012)

    Google Scholar 

  3. Fadlullah, Z.Md., Fouda, M.M., Kato, N., Takeuchi, A., et al.: Toward intelligent machine-to-machine communications in smart grid. IEEE Commun. Mag. 49(4), 60–65 (2011)

    Article  Google Scholar 

  4. 3GPP TS 22.368: Service requirements for Machine-Type Communications (MTC); Stage 1, v11.20. 2011.6

  5. 3GPP TS 23.003: Numbering, addressing and identification, v9.10.0. 2012.3

  6. 3GPP TS 33.220: Generic Authentication Architecture (GAA). Generic Bootstrapping Architecture (GBA), v10.0. 2010.8

  7. 3GPP TS 33.222: Generic Authentication Architecture (GAA). Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS). v10.0. 2010.8

  8. 3GPP TR 23.888: System improvements for Machine-Type Communications (MTC), v1.40. 2011.8

  9. 3GPP TR 33.919: 3G Security; Generic Authentication Architecture (GAA); System description, v10.0. 2011.4

  10. Lien, S.-Y., Chen, K.-C., Lin, Y.: Toward ubiquitous massive accesses in 3GPP machine-to-machine communications. IEEE Commun. Mag. 49(4), 66–74 (2011)

    Article  Google Scholar 

  11. Lin, Y.-B., Chen, Y.-K.: Reducing authentication signaling traffic in third-generation mobile network. IEEE Trans. Wirel. Commun. 2(3), 493–501 (2003)

    Article  Google Scholar 

  12. Niemi, A., Arkko, J., Torvinen, V.: Hypertext Transfer Protocol (HTTP) digest authentication using Authentication and Key Agreement (AKA), IETF RFC 3310, September 2002. www.ietf.org/rfc/rfc3310.txt

  13. Niyato, D., Lu, X., Ping, W.: Machine-to-machine communications for home energy management system in smart grid. IEEE Commun. Mag. 49(4), 53–59 (2011)

    Article  Google Scholar 

  14. RFC 2246: The TLS protocol(v1.0), The Internet Engineering Task Force (IETF), 1999

  15. RFC 3261: SIP: Session Initiation Protocol, The Internet Engineering Task Force (IETF), 2002

  16. RFC 3711: The Secure Real-time Transport Protocol (SRTP), The Internet Engineering Task Force (IETF), 2004

  17. RFC 4301: Security architecture for the Internet protocol, The Internet Engineering Task Force (IETF), 2005

  18. Ross, S.: A First Course in Probability, 7th edn. Prentice Hall, New York (2005)

    Google Scholar 

  19. TR 33.902: Formal Analysis of the 3G Authentication Protocol, v4.0.0. 2001.10

Download references

Acknowledgements

This work is partially supported by Natural Science Foundation of China (61102056, 61201132), the Fundamental Research Funds for the Central Universities (K5051201038), the 111 Project of China (B08038).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wujun Zhang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, W., Zhang, Y., Chen, J. et al. End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture. Cluster Comput 16, 861–871 (2013). https://doi.org/10.1007/s10586-013-0259-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-013-0259-6

Keywords

Navigation