Title
Achieve Secure Handover Session Key Management Via Mobile Relay In Lte-Advanced Networks
Abstract
Internet of Things is expanding the network by integrating huge amount of surrounding objects which requires the secure and reliable transmission of the high volume data generation, and the mobile relay technique is one of the efficient ways to meet the on-board data explosion in LTE-Advanced (LTE-A) networks. However, the practice of the mobile relay will pose potential threats to the information security during the handover process. Therefore, to address this challenge, in this paper, we propose a secure handover session key management scheme via mobile relay in LTE-A networks. Specifically, in the proposed scheme, to achieve forward and backward key separations, the session key shared between the on-board user equipment (UE) and the connected donor evolved node B (DeNB) is first generated by the on-board UE and then securely distributed to the DeNB. Furthermore, to reduce the communication overhead and the computational complexity, a novel proxy re-encryption technique is employed, where the session keys initially encrypted with the public key of the mobility management entity (MME) will be re-encrypted by a mobile relay node (MRN), so that other DeNBs can later decrypt the session keys with their own private keys while without the direct involvement of the MME. Detailed security analysis shows that the proposed scheme can successfully establish session keys between the on-board UEs and their connected DeNB, achieving backward and forward key separations, and resisting against the collusion between the MRN and the DeNB as the same time. In addition, performance evaluations via extensive simulations are carried out to demonstrate the efficiency and effectiveness of the proposed scheme.
Year
DOI
Venue
2017
10.1109/JIOT.2016.2614976
IEEE INTERNET OF THINGS JOURNAL
Keywords
Field
DocType
Handover, Internet of Things (IoT), LTE-Advanced (LTE-A) networks, mobile relay, secure key establishment
Mobile computing,Mobility management,Computer science,Mobile station,Computer network,Encryption,User equipment,Public-key cryptography,Session key,Handover,Distributed computing
Journal
Volume
Issue
ISSN
4
1
2327-4662
Citations 
PageRank 
References 
4
0.42
27
Authors
4
Name
Order
Citations
PageRank
Qinglei Kong1162.62
Rongxing Lu25091301.87
Shuo Chen381.52
Hui Zhu48317.00