{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T00:06:24Z","timestamp":1773187584088,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T00:00:00Z","timestamp":1668038400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T00:00:00Z","timestamp":1668038400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11036-022-02044-z","type":"journal-article","created":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T21:14:28Z","timestamp":1668114868000},"page":"1221-1245","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient Group-based Service Authentication and Session Key Negotiation Scheme for mMTC Devices in 5G"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4400-4797","authenticated-orcid":false,"given":"Wei-Kuo","family":"Chiang","sequence":"first","affiliation":[]},{"given":"Kai-Heng","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,10]]},"reference":[{"key":"2044_CR1","unstructured":"Third Generation Partnership Project, 3GPP website\u00a0http:\/\/www.3gpp.org\/"},{"key":"2044_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.vehcom.2018.01.008","volume":"12","author":"M Muhammad","year":"2018","unstructured":"Muhammad M, Safdar GA (2018) Survey on existing authentication issues for cellular-assisted V2X communication. Vehicular Commun 12:50\u201365","journal-title":"Vehicular Commun"},{"key":"2044_CR3","doi-asserted-by":"crossref","unstructured":"Chiang WK, Chen HX (2019) A quantitative approach for refactoring NFV-based Mobile Core Networks. In 2019 IEEE 30th International Conference on Application-specific Systems, Architectures and Processors (ASAP). IEEE, vol 2160, pp 135\u2013135","DOI":"10.1109\/ASAP.2019.00-17"},{"key":"2044_CR4","doi-asserted-by":"crossref","unstructured":"Gharsallah I, Smaoui S, Zarai F (2019) A secure efficient and lightweight authentication protocol for 5g cellular networks: SEL-AKA. In 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE, pp 1311\u20131316","DOI":"10.1109\/IWCMC.2019.8766448"},{"key":"2044_CR5","doi-asserted-by":"publisher","first-page":"64040","DOI":"10.1109\/ACCESS.2019.2914941","volume":"7","author":"A Braeken","year":"2019","unstructured":"Braeken A, Liyanage M, Kumar P, Murphy J (2019) Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access 7:64040\u201364052","journal-title":"IEEE Access"},{"issue":"6","key":"2044_CR6","doi-asserted-by":"publisher","first-page":"9794","DOI":"10.1109\/JIOT.2019.2931724","volume":"6","author":"J Cao","year":"2019","unstructured":"Cao J, Yu P, Xiang X, Ma M, Li H (2019) Anti-quantum fast authentication and data transmission scheme for massive devices in 5G NB-IoT system. IEEE Internet Things J 6(6):9794\u20139805","journal-title":"IEEE Internet Things J"},{"key":"2044_CR7","doi-asserted-by":"crossref","unstructured":"Xu C, Huang X, Ma M, Bao H (2018) An anonymous handover authentication scheme based on LTE-A for vehicular networks. Wireless Communications and Mobile Computing, 2018","DOI":"10.1155\/2018\/6251219"},{"key":"2044_CR8","doi-asserted-by":"publisher","first-page":"139001","DOI":"10.1109\/ACCESS.2019.2941913","volume":"7","author":"L Cao","year":"2019","unstructured":"Cao L, Liu Y, Cao S (2019) An authentication protocol in LTE-WLAN heterogeneous converged network based on certificateless signcryption scheme with identity privacy protection. IEEE Access 7:139001\u2013139012","journal-title":"IEEE Access"},{"key":"2044_CR9","doi-asserted-by":"crossref","unstructured":"Zhang X, Kunz A, Schr\u00f6der S (2017) Overview of 5G security in 3GPP. In 2017 IEEE conference on standards for communications and networking (CSCN). IEEE, pp 181\u2013186","DOI":"10.1109\/CSCN.2017.8088619"},{"key":"2044_CR10","unstructured":"Dehnel-Wild M, Cremers C (2018) Security vulnerability in 5G-AKA draft. Department of Computer Science, University of Oxford, Tech. Rep, pp 14\u201337"},{"key":"2044_CR11","doi-asserted-by":"crossref","unstructured":"Basin D, Dreier J, Hirschi L, Radomirovic S, Sasse R, Stettler V (2018) A formal analysis of 5G authentication. In Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 1383\u20131396","DOI":"10.1145\/3243734.3243846"},{"key":"2044_CR12","doi-asserted-by":"publisher","first-page":"24956","DOI":"10.1109\/ACCESS.2019.2899254","volume":"7","author":"RP Jover","year":"2019","unstructured":"Jover RP, Marojevic V (2019) Security and protocol exploit analysis of the 5G specifications. IEEE Access 7:24956\u201324963","journal-title":"IEEE Access"},{"key":"2044_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2017.11.009","volume":"102","author":"J Cao","year":"2018","unstructured":"Cao J, Ma M, Li H, Fu Y, Liu X (2018) EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1\u201316","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"2044_CR14","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1109\/JIOT.2018.2846803","volume":"6","author":"J Cao","year":"2018","unstructured":"Cao J, Yu P, Ma M, Gao W (2018) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6(2):1561\u20131575","journal-title":"IEEE Internet Things J"},{"key":"2044_CR15","doi-asserted-by":"crossref","unstructured":"Sun Y, Cao J, Ma M, Li H, Niu B, Li F (2019) Privacy-preserving device discovery and authentication scheme for D2D communication in 3GPP 5G HetNet. In 2019 International Conference on Computing, Networking, and Communications (ICNC). IEEE, pp 425\u2013431","DOI":"10.1109\/ICCNC.2019.8685499"},{"key":"2044_CR16","doi-asserted-by":"publisher","first-page":"114721","DOI":"10.1109\/ACCESS.2019.2936123","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Ren F, Wu A, Zhang T, Cao J, Zheng D (2019) Certificateless multi-party authenticated encryption for NB-IoT terminals in 5G networks. IEEE Access 7:114721\u2013114730","journal-title":"IEEE Access"},{"issue":"1","key":"2044_CR17","doi-asserted-by":"publisher","first-page":"217","DOI":"10.3390\/app10010217","volume":"10","author":"B Seok","year":"2020","unstructured":"Seok B, Sicato JCS, Erzhena T, Xuan C, Pan Y, Park JH (2020) Secure D2D communication for 5G IoT network based on lightweight cryptography. Appl Sci 10(1):217","journal-title":"Appl Sci"},{"issue":"3","key":"2044_CR18","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/JSAC.2018.2815418","volume":"36","author":"J Ni","year":"2018","unstructured":"Ni J, Lin X, Shen XS (2018) Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J Sel Areas Commun 36(3):644\u2013657","journal-title":"IEEE J Sel Areas Commun"},{"key":"2044_CR19","unstructured":"Free5GC forum, \u201cLimit on multiple UEs registration.\u201d,\u00a0https:\/\/forum.free5gc.org\/t\/limit-on-multiple-ues-registration\/533. Accessed 2 Sep 2021"},{"key":"2044_CR20","doi-asserted-by":"crossref","unstructured":"3GPP TS 23.501: \u201cSystem architecture for the 5G System (5GS); Stage 2,\u201d Release 17, v17.0.0, 2021","DOI":"10.23919\/ETR.2021.9904671"},{"key":"2044_CR21","unstructured":"3GPP TS 23.502: \u201cProcedures for the 5G System (5GS); Stage 2\u201d, Release 17, v17.0.0, 2021"},{"key":"2044_CR22","unstructured":"3GPP TS 33.501: \u201cSecurity architecture and procedures for 5G system,\u201d Release 16, v16.2.0, Mar. 2020"},{"key":"2044_CR23","doi-asserted-by":"publisher","unstructured":"Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption)\u226a cost (signature)+ cost (encryption). In Annual international cryptology conference, CRYPTO 1997: Advances in Cryptology \u2014 CRYPTO '97. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 1294, pp 165\u2013179. https:\/\/doi.org\/10.1007\/BFb0052234","DOI":"10.1007\/BFb0052234"},{"key":"2044_CR24","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1007\/s11036-009-0191-4","volume":"15","author":"J Hur","year":"2010","unstructured":"Hur J, Yoon H (2010) A multi-service group key management scheme for stateless receivers in wireless mesh networks. Mobile Netw Appl 15:680\u2013692. https:\/\/doi.org\/10.1007\/s11036-009-0191-4","journal-title":"Mobile Netw Appl"},{"key":"2044_CR25","doi-asserted-by":"crossref","unstructured":"Al-Riyami SS, Paterson KG (2003) Certificateless public-key cryptography. In International conference on the theory and application of cryptology and information security, ASIACRYPT 2003: Advances in Cryptology - ASIACRYPT 2003. Springer, Berlin, Heidelberg, pp 452\u2013473","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"2044_CR26","doi-asserted-by":"crossref","unstructured":"Barbosa M, Farshim P (2008) Certificateless signcryption. In Proceedings of the 2008 ACM symposium on Information, computer and communications security, pp 369\u2013372","DOI":"10.1145\/1368310.1368364"},{"issue":"3","key":"2044_CR27","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TIFS.2016.2631950","volume":"12","author":"A Zhang","year":"2016","unstructured":"Zhang A, Wang L, Ye X, Lin X (2016) Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems. IEEE Trans Inf Forensics Secur 12(3):662\u2013675","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2044_CR28","doi-asserted-by":"crossref","unstructured":"Modiri MM, Mohajeri J, Salmasizadeh M (2018) GSL-AKA: Group-based secure lightweight authentication and key agreement protocol for M2M communication. In 2018 9th International Symposium on Telecommunications (IST). IEEE, pp 275\u2013280","DOI":"10.1109\/ISTEL.2018.8661145"},{"issue":"3","key":"2044_CR29","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/JIOT.2015.2495321","volume":"3","author":"J Li","year":"2015","unstructured":"Li J, Wen M, Zhang T (2015) Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J 3(3):408\u2013417","journal-title":"IEEE Internet Things J"},{"key":"2044_CR30","doi-asserted-by":"publisher","first-page":"3668","DOI":"10.1109\/ACCESS.2017.2788919","volume":"6","author":"BL Parne","year":"2018","unstructured":"Parne BL, Gupta S, Chaudhari NS (2018) SEGB: Security enhanced group-based AKA protocol for M2M communication in an IoT-enabled LTE\/LTE-a network. IEEE Access 6:3668\u20133684","journal-title":"IEEE Access"},{"key":"2044_CR31","doi-asserted-by":"crossref","unstructured":"Bao F, Deng RH, Zhu H (2003) Variations of Diffie-Hellman problem. In International conference on information and communications security. Springer, Berlin, Heidelberg, pp 301\u2013312","DOI":"10.1007\/978-3-540-39927-8_28"},{"issue":"6","key":"2044_CR32","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"2044_CR33","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1007\/s11036-019-01490-6","volume":"126","author":"J Li","year":"2021","unstructured":"Li J, Tang X, Wei Z et al (2021) Identity-based multi-recipient public key encryption scheme and its application in IoT. Mobile Netw App 126:1543\u20131550. https:\/\/doi.org\/10.1007\/s11036-019-01490-6","journal-title":"Mobile Netw App"},{"key":"2044_CR34","doi-asserted-by":"crossref","unstructured":"Paar C, Pelzl J (2010) Understanding cryptography. A textbook for students and practitioners. Springer, Berlin","DOI":"10.1007\/978-3-642-04101-3"},{"key":"2044_CR35","doi-asserted-by":"crossref","unstructured":"Selvi SSD, Vivek SS, Rangan CP (2009) Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. In International conference on information security and cryptology, Inscrypt 2009: Information Security and Cryptology. Springer, Berlin, Heidelberg, pp 75\u201392","DOI":"10.1007\/978-3-642-16342-5_6"},{"key":"2044_CR36","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pp 62\u201373","DOI":"10.1145\/168588.168596"},{"key":"2044_CR37","doi-asserted-by":"crossref","unstructured":"Blanchet B (2016) Modeling and verifying security protocols with the applied pi calculus and proverif. Foundations and Trends in Privacy and Security 1(1-2):1\u2013135. ProVerif: Cryptographic protocol verifier in the formal model. https:\/\/prosecco.gforge.inria.fr\/personal\/bblanche\/proverif\/. Accessed 7 Nov 2022","DOI":"10.1561\/3300000004"},{"issue":"17","key":"2044_CR38","doi-asserted-by":"publisher","first-page":"3492","DOI":"10.1016\/j.comnet.2013.08.003","volume":"57","author":"C Lai","year":"2013","unstructured":"Lai C, Li H, Lu R, Shen XS (2013) SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Comput Netw 57(17):3492\u20133510","journal-title":"Comput Netw"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-02044-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-022-02044-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-02044-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T17:07:47Z","timestamp":1724087267000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-022-02044-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,10]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["2044"],"URL":"https:\/\/doi.org\/10.1007\/s11036-022-02044-z","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,10]]},"assertion":[{"value":"9 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}