[1] 王胡成, 徐晖, 程志密, 等. 5G网络技术研究现状和发展趋势[J]. 电信科学, 2015, 31(9):149-155.(WANG H C,XU H, CHENG Z M,et al. Current research and development trend of 5G network technologies[J]. Telecommunications Science,2015,31(9):149-155.) [2] SAEDY M,MOJTAHED V. Machine-to-machine communications and security solution in cellular systems[J]. International Journal of Interdisciplinary Telecommunications and Networking,2011,3(2):66-75. [3] FADLULLAH Z M,FOUDA M M,KATO N,et al. Toward intelligent machine-to-machine communications in smart grid[J]. IEEE Communications Magazine,2011,49(4):60-65. [4] SALAM T,REHMAN W U,TAO X. Data aggregation in massive machine type communication:challenges and solutions[J]. IEEE Access,2019,7:41921-41946. [5] 3rd Generation Partnership Project. Service requirements for Machine-Type Communication(MTC)(release 13):TS 22.368 V13.1. 0[S]. Sophia Antipolis:3GPP,2014. [6] 3rd Generation Partnership Project. Study on security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements (release 11):TR 33.868 VO. 7.0[S]. Sophia Antipolis:3GPP,2012. [7] JUNG K R, PARK A, LEE S. Machine-Type-Communication (MTC) device grouping algorithm for congestion avoidance of MTC oriented LTE network[C]//Proceedings of the 2010 International Conference on Security-Enriched Urban Computing and Smart Grid, CCIS 78. Berlin:Springer,2010:167-178. [8] CAO J,MA M,LI H. A group-based authentication and key agreement for MTC in LTE networks[C]//Proceedings of the 2012 IEEE Global Communications Conference. Piscataway:IEEE, 2012:1017-1022. [9] ADHIKARI M,PANDA P K,CHATTOPADHYAY S,et al. a novel group-based authentication and key agreement protocol for IoT enabled LTE/LTE-A network[C]//Proceedings of the 2020 International Conference on Wireless Communications Signal Processing and Networking. Piscataway:IEEE,2020:168-172. [10] HARN L. Group authentication[J]. IEEE Transactions on Computers,2013,62(9):1893-1898. [11] HARN L,HSU C F. A novel design of membership authentication and group key establishment protocol[J]. Security and Communication Networks,2017,2017:Article No. 8547876. [12] LI J,WEN M,ZHANG T. Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks[J]. IEEE Internet of Things Journal,2016,3(3):408-417. [13] SHAMIR A. How to share a secret[J]. Communications of the ACM,1979,22(11):612-613. [14] KUMARESAN R, PATRA A, RANGAN C P. The round complexity of verifiable secret sharing:the statistical case[C]//Proceedings of the 2010 International Conference on the Theory and Application of Cryptology and Information Security,LNCS 6477. Berlin:Springer,2010:431-447. [15] LIU D,NING P,LI R. Establishing pairwise keys in distributed sensor networks[J]. ACM Transactions on Information and System Security,2005,8(1):41-77. [16] JIANG Q,ZEADALLY S,MA J,et al. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks[J]. IEEE Access,2017,5:3376-3392. [17] MUHAMMAD M, SAFDAR G A. Survey on existing authentication issues for cellular-assisted V2X communication[J]. Vehicular Communications,2018,12:50-65. [18] 3rd Generation Partnership Project. 3G security;security threats and requirements(release 4):TS 21.133 V4.1. 0[S]. Sophia Antipolis:3GPP,2002. [19] 3rd Generation Partnership Project. 3GPP System Architecture Evolution(SAE);security architecture(release 15):TS 33.401 V15.8. 0[S]. Sophia Antipolis:3GPP,2019. [20] OUAISSA M, HOUMER M, OUAISSA M. An enhanced authentication protocol based group for vehicular communications over 5G networks[C]//Proceedings of the 2020 3rd International Conference on Advanced Communication Technologies and Networking. Piscataway:IEEE,2020:1-8. [21] 王霏, 陈明. 完美前向安全的基于身份认证密钥协商方案[J]. 密码学报, 2020, 7(1):56-68.(WANG F,CHEN M. An identitybased authenticated key agreement scheme with perfect forward secrecy[J]. Journal of Cryptologic Research,2020,7(1):56-68.) [22] BASSIL R,CHEHAB A,ELHAJJ I,et al. Signaling oriented denial of service on LTE networks[C]//Proceedings of the 2012 10th ACM International Symposium on Mobility Management and Wireless Access. New York:ACM,2012:153-158. [23] ZHANG M,FANG Y. Security analysis and enhancements of 3GPP authentication and key agreement protocol[J]. IEEE Transactions on Wireless Communications,2005,4(2):734-742. [24] LAI C,LI H,LU R,et al. SE-AKA:a secure and efficient group authentication and key agreement protocol for LTE networks[J]. Computer Networks,2013,57(17):3492-3510. [25] YAO J,WANG T,CHEN M,et al. GBS-AKA:group-based secure authentication and key agreement for M2M in 4G network[C]//Proceedings of the 2016 International Conference on Cloud Computing Research and Innovations. Piscataway:IEEE,2016:42-48. |