Citation: | ZHANG Wenfang, SUN Haifeng, WANG Yu, LIN Wei, WANG Xiaomin. Security and Efficiency Enhanced Authentication Scheme Based on Self-Updated Hash Chain for Train-Ground Communication[J]. Journal of Southwest Jiaotong University, 2020, 55(6): 1171-1180, 1206. doi: 10.3969/j.issn.0258-2724.20190205 |
The 3rd Generation Partnership Project. 3GPP system architecture evolution (SAE); security architecture: 3GPP TS 33.401 V12.5.0[S]. Valbonne: 3GPP Organizational Partners, 2012.
|
CAO J, MA M, LI H. A survey on security aspects for LTE & LTE-A networks[J]. IEEE Communications Surveys and Tutorials, 2014, 16(1): 283-302. doi: 10.1109/SURV.2013.041513.00174
|
ABDRABOU M A, ELBAYOUMY A D E, El-WANIS E A. LTE authentication protocol (EPS-AKA) weaknesses solution[C]//2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems. Cairo: IEEE, 2015: 434-441.
|
ABDELJEBBAR M, ELKOUCH R. Security analysis of LTE/SAE networks over E-UTRAN[C]//2016 International Conference on Information Technology for Organizations Development (IT4OD). Fez: IEEE, 2016: 1-5.
|
ALEZABI K A, HASHIM F, HASHIM S J, et al. An efficient authentication and key agreement protocol for 4G (LTE) networks[C]//IEEE REGION 10 SYMPOSIUM. Kuala Lumpur: IEEE, 2014: 502-507.
|
KIM S, CHOI J Y, JEONG J. On authentication signaling costs in hierarchical LTE networks[C]//IEEE 7th International Conference on Ubi-Media Computing and Workshops. Ulaanbaatar: IEEE, 2014: 11-16.
|
LI Jinguo, WEN Mi, ZHANG Tao. Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks[J]. IEEE Internet of Things Journal, 2016, 3(3): 408-417. doi: 10.1109/JIOT.2015.2495321
|
HUAN C K. Security analysis and enhancements in LTE-advanced networks[D]. Seoul: Sungkyunkwan University, 2011.
|
HAMANDI K, SARJI I, CHEHAB A, et al. Privacy enhanced and computationally efficient HSK-AKA LTE scheme[C]//IEEE 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA). Barcelona: IEEE, 2013: 929-934.
|
DEGEFA F B, LEE D, KIM J, et al. Performance and security enhanced authentication and key agreement protocol for SAE/LTE network[J]. Computer Networks, 2016, 94(15): 145-163.
|
LI Xiehua, WANG Yongjun. Security enhanced authentication and key agreement protocol for LTE/SAE network[C]//2011 7th International Conference on Wireless Communications, Networking and Mobile Computing. Wuhan: IEEE, 2011: 1-4.
|
DENG Yaping, FU Hong, XIE Xianzhong, et al. A novel 3GPP SAE authentication and key agreement protocol[C]//IEEE International Conference on Network Infrastructure & Digital Content. Beijing: IEEE, 2009: 557-561.
|
FANG Jiexiang, JIANG Rui. An analysis and improvement of 3GPP SAE AKA protocol based on strand space model[C]//2010 International Conference on Network Infrastructure and Digital Content (IC-NIDC). Beijing: IEEE, 2010: 789-793.
|
QIU Y, MA M, WANG X. A proxy signature-based handover authentication scheme for LTE wireless networks[J]. Journal of Network and Computer Applications, 2017, 83(4): 63-71.
|
PRASAD M, MANOHARAN R. A robust secure DS-AKA with mutual authentication for LTE-A[J]. Applied Mathematical Sciences, 2015, 9(4): 2337-2349.
|
姚洪磊,张彦,周泽岩. 基于PKI/CA技术的铁路身份认证体系[J]. 中南大学学报(自然科学版),2013,44(1): 356-361.
YAO Honglei, ZHANG Yan, ZHOU Zeyan. Planning and constructing of PKI/CA certification system of railway industry[J]. Journal of Central South University (Science and Technology), 2013, 44(1): 356-361.
|
GAO Tingting, SUN Bin. A high-speed railway mobile communication system based on LTE[C]//International Conference on Electronics & Information Engineering. Kyoto: IEEE, 2010: 414-417.
|
HE Ruisi, AI Bo. High-speed railway communications:from GSM-R to LTE-R[J]. IEEE Vehicular Technology Magazine, 2016, 11(3): 49-58. doi: 10.1109/MVT.2016.2564446
|
LAMPORT L. Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24(24): 770-772.
|
白媛,王倩,贾其兰,等. 一种高效安全的EPS AKA协议[J]. 北京邮电大学学报,2015,38(1): 10-14.
BAI Yuan, WANG Qian, JIA Qilan, et al. An efficient and secured AKA for EPS networks[J]. Journal of Beijing University of Posts and Telecommunications, 2015, 38(1): 10-14.
|
CAO Jin, LI Hui, MA M, et al. A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks, 2012, 56(8): 2119-2131. doi: 10.1016/j.comnet.2012.02.012
|
[1] | WANG Xu, WANG Mingnian, YAN Tao, YU Li. Influence of Base Emission Factor Update on Tunnel Fresh-Air Demand[J]. Journal of Southwest Jiaotong University, 2024, 59(1): 113-120. doi: 10.3969/j.issn.0258-2724.20210585 |
[2] | ZHANG Liyan, LUO Bo, ZHENG Xing, LIU Yuxiao, WANG Jie. Protection Scheme of New Continuous Cable Power Supply System[J]. Journal of Southwest Jiaotong University, 2023, 58(5): 1135-1144. doi: 10.3969/j.issn.0258-2724.20220510 |
[3] | ZHANG Liping, YANG Yu, JIN Feihu, LI Song, HAO Zhongxiao. A Skyline Query Method Based on Differential Privacy Protection[J]. Journal of Southwest Jiaotong University, 2022, 57(5): 982-989. doi: 10.3969/j.issn.0258-2724.20200714 |
[4] | LI Zechen, LI Hengchao, HU Wenshuai, YANG Jinyu, HUA Zexi. Masked Face Detection Model Based on Multi-scale Attention-Driven Faster R-CNN[J]. Journal of Southwest Jiaotong University, 2021, 56(5): 1002-1010. doi: 10.3969/j.issn.0258-2724.20210017 |
[5] | JIANG Zhengrong, LIU Xiaowei, SHI Kairong, LIN Quanpan. Method of Force-Finding Analysis Based on Ratio Updating for Cable Domes[J]. Journal of Southwest Jiaotong University, 2020, 55(1): 150-157. doi: 10.3969/j.issn.0258-2724.20180201 |
[6] | XIONG Ling, PENG Daiyuan, PENG Tu, LIANG Hongbin. Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services[J]. Journal of Southwest Jiaotong University, 2019, 54(1): 202-210. doi: 10.3969/j.issn.0258-2724.20170596 |
[7] | MA Lianchuan, ZHANG Yuzhuo, SUN Yaqing, MU Jiancheng, CAO Yuan. Reliability and Delay of DSPN-Based Ground Communication System in High-Speed Maglev Vehicles[J]. Journal of Southwest Jiaotong University, 2014, 27(6): 1016-1023. doi: 10.3969/j.issn.0258-2724.2014.06.013 |
[8] | LIU Li, WANG Yongqing. Security Analysis of Video Hashing[J]. Journal of Southwest Jiaotong University, 2012, 25(4): 675-679. doi: 10.3969/j.issn.0258-2724.2012.04.022 |
[9] | LI Ye, YAN Yusong. Model of Train Residence Time within GSM-R Cell in Section of Passenger Dedicated Line[J]. Journal of Southwest Jiaotong University, 2010, 23(6): 965-972. doi: 10.3969/j.issn.0258-2724.2010.06.024 |
[10] | LIU Xiufeng, ZHANG Aili. Weightable and Regular Independent System[J]. Journal of Southwest Jiaotong University, 2007, 20(3): 384-388. |
[11] | LIU Zhenfeng, FENG Quanyuan. Thermal Shutdown Circuit with Low Voltage and Low Power Consumption for Power Management IC[J]. Journal of Southwest Jiaotong University, 2006, 19(3): 310-313. |
[12] | ZHENG Yu, HE Da-ke, MEI Qi-xiang. Trusted Computing-Based Security Model for Software Protection[J]. Journal of Southwest Jiaotong University, 2006, 19(1): 63-67,96. |
[13] | LIU Zhao-hui, LI Li. Control of Chaotic Motion of a Planar 2R Robot[J]. Journal of Southwest Jiaotong University, 2006, 19(1): 11-14. |
[14] | RONG Jian, HU Yu. Key Technology and Schemes of Optical Communication between GEO and LEO[J]. Journal of Southwest Jiaotong University, 2003, 16(2): 220-223. |
1. | 陈永,常婷,张冰旺. 混沌映射与中国剩余定理增强的切换认证方案. 西安电子科技大学学报. 2024(04): 192-205 . ![]() | |
2. | 陈永,刘雯,詹芝贤. 基于混合密钥增强的LTE-R车地认证密钥协商方案. 铁道学报. 2023(06): 69-79 . ![]() |