首页--工业技术论文--无线电电子学、电信技术论文--无线通信论文--移动通信论文

Group-Based Handover Authentication Scheme for Machine-to-Machine Communication in LTE-A Network

摘要第4-5页
Abstract第5页
Dedication第6-10页
Chapter 1 Introduction第10-19页
    1.1 Background第11-13页
    1.2 Research Motivation第13-14页
    1.3 Related Work第14-17页
    1.4 Research Goals第17-18页
    1.5 Thesis Overview第18-19页
Chapter 2 Preliminary第19-23页
    2.1 Aggregate Message Authentication Code第19-20页
    2.2 Elliptic Curve Diffie-Hellman (ECDH)第20页
    2.3 Pro-Verif Tool第20-23页
Chapter 3 Machine-to-Machine Communication and Security Analysis in LTE-A Networks第23-46页
    3.1 Overview of LTE-A networks第23-28页
        3.1.1 LTE-A Network Architecture第24-26页
        3.1.2 LTE-A Security Architecture第26-27页
        3.1.3 Security in A LTE-A Cellular System第27-28页
    3.2 Significance of Machine-to-Machine Communications第28-35页
        3.2.1 MTC Network Security第29-31页
        3.2.2 Security in Machine-to-Machine Communication第31-32页
        3.2.3 MTC security framework and its security requirements第32-34页
        3.2.4 Vulnerabilities in M2M communication Architecture第34-35页
    3.3 Security Mechanism in EPS-AKA第35-39页
        3.3.1 EPS-AKA Process第37-38页
        3.3.2 Problems with AKA authorization第38-39页
    3.4 Handover in LTE-A Handover Network第39-46页
        3.4.1 Vulnerability in LTE-A Handover Process第40-41页
        3.4.2 Security in Handover Processes第41-46页
Chapter 4 A Secure and Efficient Group-Based Handover Authentication Scheme for Machine-to-Machine Communication in LTE-A Network第46-61页
    4.1 The proposed Method第47-53页
        4.1.1 An Initial Authentication Phase第47-49页
        4.1.2 Mutual authentication phase第49页
        4.1.3 Group-Based Handover Authentication Phase第49-53页
    4.2 Security analysis第53-58页
        4.2.1 Analysis by Security Aspects第53-55页
        4.2.2 Security Analysis by Using Pro-Verif Tool第55-58页
    4.3 Performance Evaluation第58-61页
Chapter 5 Conclusion第61-62页
Acknowledgements第62-63页
References第63-70页
Publications第70页

论文共70页,点击 下载论文
上一篇:移动机器人嵌入式平台的障碍检测与跟踪研究及优化实现
下一篇:An Approach for Generating Call Graph of Java/Android Programs