[1] |
黄韬,刘韵洁,张智江.LTE/SAE移动通信网络技术 [M].北京:人民邮电出版社, 2009.
|
[2] |
卢建军. 基于物联网的工业化与信息化模式研究[J]. 西安邮电学院学报, 2010, 15(6): 64-67.
|
[3] |
赵小强,雷雪,冯勋. 基于ZigBee/3G的物联网网关系统[J]. 西安邮电大学学报, 2015, 20(1): 24-29.
|
[4] |
GILANI S. The Promise of M2M: How Pervasive Connected Machines are Fueling the Next Wireless Revolution [EB/OL]. , 2016-06-15.
|
[5] |
3GPP. TR .23.888 V1.4.0 System Improvements for Machine-Type Communications[S]. Sophia Antipolis Valbonne:3rd Generation Partnership Project, 2011.
|
[6] |
郑东, 赵庆兰, 张应辉. 密码学综述[J]. 西安邮电大学学报,2013,18(6): 1-10.
|
[7] |
CHADCHAN S M, AKKI C B.3GPP LTE/SAE: An Overview[J]. International Journal of Computer and Electrical Engineering, 2010, 2(5): 806.
|
[8] |
3GPP. TS. 33.401 V12.5.0 System Architecture Evolution (SAE); Security architecture[S]. Sophia Antipolis Valbonne:3rd Generation Partnership Project, 2012.
|
[9] |
DORASWAMY N, HARKINS D.IPSec: the New Security Standard for the Internet, Intranets, and Virtual Private Networks[M]. New Jersey: Prentice Hall Professional, 2003.
|
[10] |
TTC.TR 29.060 V11.3.0 GPRS Tunnelling Protocol (GTP) across the Gn and Gp interface [EB/OL]. .
|
[11] |
3GPP. TR 29.275 v. 11.3.0 Proxy Mobile IPv6 (PMIPv6) based Mobility and Tunnelling protocols[S]. Sophia Antipolis Valbonne:3rd Generation Partnership Project, 2012.
|
[12] |
Network Working Group.RFC 4187 Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)[S]. Finland:Internet Engineering Task Force, 2006.
|
[13] |
Network Working Group.RFC 5448 Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)[S]. Finland:Internet Engineering Task Force, 2009.
|
[14] |
KOIEN G M.An Introduction to Access Security in UMTS[J]. IEEE Wireless Communications, 2004, 11(1): 8-18.
|
[15] |
3GPP. TS 21.133 V4.1.0 3G Security; Security Threats and Requirements[S]. Sophia Antipolis Valbonne:3rd Generation Partnership Project, 2001.
|
[16] |
ZHANG M X, FANG Y G.Security Analysis and Enhancements of 3GPP Authentication and Key Agreement protocol[J]. IEEE Trans. Wirel. Commun, 2005, 4(2): 734-742.
|
[17] |
JUANG W, WU J.Efficient 3GPP Authentication and Key Agreement with Robust User Privacy Protection[C]//IEEE. International Conference on IEEE Wireless Communications and Networking, March 11-15, 2007, Hong Kong, China. New York: IEEE, 2007: 2722-2727.
|
[18] |
OU H, HWANG M, JAN J.A Cocktail Protocol with the Authentication and Key Greement on the UMTS[J]. J. Syst. Softw, 2010, 83(2): 316-325.
|
[19] |
WU S H, ZHU Y F, PU Q.Security Analysis of a Cocktail Protocol with the Authentication and Key Agreement on the UMTS[J]. IEEE Commun. Lett, 2010, 14(4): 366-368.
|
[20] |
HUANG Y L, SHEN C Y, SHIEH S W.S-AKA: a Provable and Secure Authentication Key Agreement Protocol for UMTS Networks[J]. IEEE Trans. Veh. Technol, 2011, 60(9): 4509-4519.
|
[21] |
LIN Y, CHEN Y.Reducing Authentication Signaling Traffic in Third-generation Mobile Network[J]. IEEE Transaction on Wireless Communications, 2003, 2(3): 493-501.
|
[22] |
HUANG C, LI J.Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption[C]// IEEE. 19th IEEE International Conference on Advanced Information Networking and Applications (AINA), March 28-30, 2005, Taiwan, China. New York: IEEE, 2005: 392-397.
|
[23] |
AL-SARAIREH J, YOUSEF S.A New Authentication Protocol for UMTS Mobile Networks[J]. EURASIP Journal of Wireless Communications and Networking, 2006, 2006(4): 1-10.
|
[24] |
LEE C, CHEN C, OU H, et al.Extension of an Efficient 3GPP Authentication and Key Agreement Protocol[J]. Wireless Personal Communications 2013, 68(3):861-872.
|
[25] |
陆蜂,郑康锋,钮心忻,等. 3GPP认证与密钥协商协议安全性分析[J]. 软件学报, 2010, 21(7): 1768-1782.
|
[26] |
JIANG Y X, LIN C, SHEN X, et al.Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks[J]. IEEE Trans. Wireless Commun, 2006, 5(9): 2569-2577.
|
[27] |
SHI M H, RUTAGEMWA H, SHEN X, et al.A Service-agentbased Roaming Architecture for WLAN/Cellular Integrated Networks[J]. IEEE Trans. Veh. Technol., 2007, 56(5): 3168-3181.
|
[28] |
YANG G M, HUANG Q, WONG D S, et al.Universal Authentication Protocols for Anonymous Wireless Communications[J]. IEEE Trans. Wireless Commun, 2010, 9(1): 168-174.
|
[29] |
HE Daojing, BU Jiajun, CHAN S, et al.Privacy-preserving Universal Authentication Protocol for Wireless Communications[J]. IEEE Trans. Wireless Commun, 2011, 10(2): 431-436.
|
[30] |
CHUANG M, LEE J, CHEN M.SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks[J].IEEE Systems Journal, 2013, 7(1): 102-113.
|
[31] |
WAN Z, REN K, PRENEEL B.A Secure Privacy-preserving Roaming Protocol Based on Hierarchical Identity-based Encryption for Mobile Networks[C]// ACM. ACM Conference on Wireless Network Security, WISEC 2008, March 31-April, Alexandria. New York: ACM,2008:62-67.
|
[32] |
KIM Y, REN W, JO J, et al.SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-based Cryptography[C]// IEEE. IEEE ICC, June 24-28, 2007, Glasgow. New York: IEEE, 2007: 1570-1575.
|
[33] |
REN J, HARN L.An Efficient Threshold Anonymous Authentication Scheme for Privacy-preserving Communications[J]. IEEE Trans. Wireless Commun, 2013, 12(3): 1018-1025.
|
[34] |
LAI C Z, LI H, LIANG X H, et al.CPAL: A Conditional Privacy-preserving Authentication with Access Linkability for Roaming Service[J]. IEEE Internet of Things Journal, 2014, 1(1): 46-57.
|
[35] |
MUN H, HAN K, KIM K.3G-WLAN Interworking: Security Analysis and New Authentication and Key Agreement Based on EAP-AKA[C]//IEEE. IEEE Wireless Telecommunications Symposium WTS, April 22-24, 2009, Prague. New York: IEEE, 2009: 1-8.
|
[36] |
NTANTOGIAN C, XENAKIS C.One-pass EAP-AKA Authentication in 3GWLAN Integrated Networks[J]. Wirel. Pers. Commun, 2009, 48(4): 569-584.
|
[37] |
AHMAVAARA K, HAVERINEN H, PICHNA R.Interworking Architecture between 3GPP and WLAN Systems[J]. IEEE Commun Mag, 2003, 41(11): 74-81.
|
[38] |
PRASITHSANGAREE P, KRISHNAMURTHY P.A New Authentication Mechanism for Loosely Coupled 3G-WLAN Integrated Networks[C]// IEEE. IEEE Vehicular Technology Conference, May 17-19, 2004, Seoul. New York: IEEE, 2004: 2998-3003.
|
[39] |
SHIDHANI A, LEUNG V.Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers[J]. IEEE Trans. Dependable Secur. Comput, 2011, 8(5) : 699-713.
|
[40] |
OTHMEN S, ZARAI F, OBAIDAT M.et al.Re-authentication Protocol from WLAN to LTE (ReP WLAN-LTE)[C]// IEEE. IEEE Global Communication Conference (GLOBECOM), December 9-13, 2013, Atlanta. New York: IEEE, 2013: 1446-1451.
|
[41] |
Network Working Group.RFC 4423 Host Identity Protocol (HIP) Architecture[S]. California:Internet Engineering Task Force, 2006.
|
[42] |
RFC 5201 Host Identity Protocol[S].California: Internet Engineering Task Force, 2008.
|
[43] |
MOSKOWITZ R. HIP Diet EXchange (DEX), IETF Internet Draft (Work in Progress), draft-moskowitz-hip-rg-dex-06 [EB/OL]. , 2016-06-15.
|
[44] |
CHEN Y W, WANG J T, CHI K H, et al.Group-based Authentication and Key Agreement[J]. Wirel. Pers. Commun, 2012, 62(4): 965-979.
|
[45] |
LAI C Z, LI H, LI X Q, et al.A Novel Group Access Authentication and Key Agreement Protocol for Machine-type Communication[J].Transactions on Emerging Telecommunications Technologies, 2015, 26(3): 414-431.
|
[46] |
LAI C Z, LI H, LU R, et al.SE-AKA: A Secure and Efficient Group Authentication and Key Agreement Protocol for LTE Networks[J]. Computer Networks, 2013, 57(17) : 3492-3510.
|
[47] |
JIANG R, LAI C, LUO J, et al.EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications[J].International Journal of Distributed Sensor Networks, 2013, 2013(6): 1-14.
|
[48] |
YANG T T, LAI C Z, LU R, et al.EAPSG: Efficient Authentication Protocol for Secure Group Communications in Maritime Wideband Communication Networks[J]. Peer-to-Peer Networking and Applications, 2014, 7(1): 1-13.
|
[49] |
HUANG J, YEH L, CHIEN H.ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks[J]. IEEE Transactions on Vehicular Technology, 2011, 60(1): 248-262.
|
[50] |
CAO J, MA M D, LI H.A Group-based Authentication and Key Agreement for MTC in LTE Networks[C]//IEEE. IEEE Global Communications Conference (GLOBECOM), December 3-7, 2012, Anaheim. New York: IEEE, 2012: 1017-1022.
|
[51] |
LAI C Z, LI H, LU R, et al.SEGR: A Secure and Efficient Group Roaming Scheme for Machine to Machine Communications between 3GPP and WiMAX Networks[C]// IEEE. IEEE International Conference on Communication, June 10-14, 2014, Sydney. New York: IEEE, 2014: 1011-1016.
|
[52] |
LAI C Z, LU R, ZHENG D, et al.GLARM: Group-based Lightweight Authentication Scheme for Resource-constrained Machine to Machine Communications[J]. Computer Networks, 2016: 66-81.
|
[53] |
DIFFIE W, HELLMAN M.New Directions in Cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
|
[54] |
GARG S, GENTRY C, HALEVI S.Candidate Multilinear Maps from Ideal Lattices[C]// Springer. International Association for Cryptologic Research. Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 26-30, 2013, Athens. Berlin Heidelberg:Springer , 2013: 1-17.
|
[55] |
HU Y P, JIA H W.Cryptanalysis of GGH Map[C]// International Association for Cryptologic Research. Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 8-12, 2016, Vienna. Berlin Heidelberg:Springer , 2016: 537-565.
|