{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:32:40Z","timestamp":1763105560254},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T00:00:00Z","timestamp":1509062400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11277-017-5005-6","type":"journal-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T17:36:13Z","timestamp":1509125773000},"page":"2867-2899","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["DGBES: Dynamic Group Based Efficient and Secure Authentication and Key Agreement Protocol for MTC in LTE\/LTE-A Networks"],"prefix":"10.1007","volume":"98","author":[{"given":"Shubham","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Balu L.","family":"Parne","sequence":"additional","affiliation":[]},{"given":"Narendra S.","family":"Chaudhari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,27]]},"reference":[{"issue":"1","key":"5005_CR1","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s11277-011-0288-5","volume":"58","author":"D Bandyopadhyay","year":"2011","unstructured":"Bandyopadhyay, D., & Sen, J. (2011). Internet of Things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58(1), 49\u201369.","journal-title":"Wireless Personal Communications"},{"key":"5005_CR2","unstructured":"Network EUTRA. (2011). 3rd generation partnership project; technical specification group services and system aspects; general packet radio service (GPRS) enhancements for evolved universal terrestrial radio access network (E-UTRAN) access."},{"issue":"2","key":"5005_CR3","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/COMST.2014.2361626","volume":"17","author":"F Ghavimi","year":"2015","unstructured":"Ghavimi, F., & Chen, H. H. (2015). M2M communications in 3GPP LTE\/LTE-A networks: Architectures, service requirements, challenges, and applications. IEEE Communications Surveys & Tutorials, 17(2), 525\u2013549.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2","key":"5005_CR4","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11277-015-2746-y","volume":"85","author":"J Poncela","year":"2015","unstructured":"Poncela, J., Moreno-Roldan, J., Aamir, M., & Alvi, B. A. (2015). M2M challenges and opportunities in 4G. Wireless Personal Communications, 85(2), 407\u2013420.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"5005_CR5","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/SURV.2013.100713.00203","volume":"16","author":"J Kim","year":"2014","unstructured":"Kim, J., Lee, J., Kim, J., & Yun, J. (2014). M2M service platforms: Survey, issues, and enabling technologies. IEEE Communications Surveys & Tutorials, 16(1), 61\u201376.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"5005_CR6","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/MCOM.2012.6163599","volume":"50","author":"T Taleb","year":"2012","unstructured":"Taleb, T., & Kunz, A. (2012). Machine type communications in 3GPP networks: Potential, challenges, and solutions. IEEE Communications Magazine, 50(3), 178\u2013184.","journal-title":"IEEE Communications Magazine"},{"key":"5005_CR7","doi-asserted-by":"crossref","first-page":"2002","DOI":"10.1002\/sec.1455","volume":"9","author":"A Fu","year":"2016","unstructured":"Fu, A., Song, J., Li, S., Zhang, G., & Zhang, Y. (2016). A privacy-preserving group authentication protocol for machine-type communication in LTE\/LTE-A networks. Security and Communication Networks, 9, 2002\u20132014.","journal-title":"Security and Communication Networks"},{"issue":"3","key":"5005_CR8","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MWC.2010.5490974","volume":"17","author":"A Ghosh","year":"2010","unstructured":"Ghosh, A., Ratasuk, R., Mondal, B., Mangalvedhe, N., & Thomas, T. (2010). LTE-advanced: Next-generation wireless broadband technology [invited paper]. IEEE Wireless Communications, 17(3), 10\u201322.","journal-title":"IEEE Wireless Communications"},{"key":"5005_CR9","unstructured":"3GPP. (June 2012). Evolved universal terrestrial radio access (E-UTRA) and evolved universal terrestrial radio access network (EUTRAN), overall description. Sophia-Antipolis Cedex, France, 3GPP TS 36300 V1120."},{"key":"5005_CR10","unstructured":"Scheme, B. T. (2009). LTE: The evolution of mobile broadband. IEEE Communications Magazine (p. 45)."},{"issue":"3","key":"5005_CR11","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1002\/ett.2635","volume":"26","author":"C Lai","year":"2015","unstructured":"Lai, C., Li, H., Li, X., & Cao, J. (2015). A novel group access authentication and key agreement protocol for machine-type communication. Transactions on Emerging Telecommunications Technologies, 26(3), 414\u2013431.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"2","key":"5005_CR12","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s11276-014-0788-9","volume":"21","author":"D Choi","year":"2015","unstructured":"Choi, D., Choi, H. K., & Lee, S. Y. (2015). A group-based security protocol for machine-type communications in LTE-advanced. Wireless Networks, 21(2), 405\u2013419.","journal-title":"Wireless Networks"},{"key":"5005_CR13","unstructured":"3GPP. (June 2012). 3rd generation partnership project; technical specification group services and system aspects; service requirements for the evolved packet system (EPS) (Rel 12). 3GPP TS 22278 V1210."},{"key":"5005_CR14","unstructured":"3GPP. (Sep. 2012). 3rd generation partnership project; technical specification group core network and terminals; access to the 3GPP evolved packet core (EPC) via non-3GPP access networks (Rel 11). 3GPP TS 24302 V1140."},{"key":"5005_CR15","unstructured":"3GPP. (Sep 2012). Service requirements for machine-type communications; Security aspects of machine-type communications (MTC). Sophia-Antipolis Cedex, France, 3GPPTS 22368 V1150."},{"issue":"1","key":"5005_CR16","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1109\/SURV.2013.041513.00174","volume":"16","author":"J Cao","year":"2014","unstructured":"Cao, J., Ma, M., Li, H., Zhang, Y., & Luo, Z. (2014). A survey on security aspects for lte and LTE-A networks. IEEE Communications Surveys & Tutorials, 16(1), 283\u2013302.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"5005_CR17","first-page":"69","volume":"2","author":"M Purkhiabani","year":"2012","unstructured":"Purkhiabani, M., & Salahi, A. (2012). Enhanced authentication and key agreement procedureof next generation 3GPP mobile networks. International Journal of Information and Electronics Engineering, 2(1), 69.","journal-title":"International Journal of Information and Electronics Engineering"},{"key":"5005_CR18","unstructured":"Vintil\u0103, C. E., Patriciu, V. V., & Bica, I. (2011). Security analysis of LTE access network. In Proceedings of the 10th international conference on network (pp. 29\u201334)."},{"key":"5005_CR19","doi-asserted-by":"crossref","unstructured":"Abdeljebbar, M., & Elkouch, R. (2016). Security analysis of LTE\/SAE networks over E-UTRAN. In 2016 international conference on information technology for organizations development (IT4OD), IEEE (pp. 1\u20135).","DOI":"10.1109\/IT4OD.2016.7479296"},{"key":"5005_CR20","doi-asserted-by":"crossref","unstructured":"Arkko, J., & Haverinen, H. (2006). Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA).","DOI":"10.17487\/rfc4187"},{"key":"5005_CR21","unstructured":"3GPP. (June 2012). 3rd generation partnership project; technical specification group services and system aspects; 3GPP system architecture evolution (SAE); security aspects of non-3GPP accesses (Rel 11). 3GPP TS 33402 V1140."},{"key":"5005_CR22","unstructured":"3GPP. (Sep 2012). 3rd generation partnership project; technical specification group services and system aspects; 3GPP system architecture evolution (SAE); security architecture (Rel 12). 3GPP TS 33401 V1250."},{"key":"5005_CR23","unstructured":"ROLES EPO. (2014). Machine-to-machine. https:\/\/www.ericsson.com\/res\/docs\/whitepapers\/wp-m2m.pdf ."},{"key":"5005_CR24","doi-asserted-by":"crossref","first-page":"304601","DOI":"10.1155\/2013\/304601","volume":"9","author":"R Jiang","year":"2013","unstructured":"Jiang, R., Lai, C., Luo, J., Wang, X., & Wang, H. (2013). EAP-based group authentication and key agreement protocol for machine-type communications. International Journal of Distributed Sensor Networks, 9, 304601.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"4","key":"5005_CR25","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1007\/s11277-010-0104-7","volume":"62","author":"YW Chen","year":"2012","unstructured":"Chen, Y. W., Wang, J. T., Chi, K. H., & Tseng, C. C. (2012). Group-based authentication and key agreement. Wireless Personal Communications, 62(4), 965\u2013979.","journal-title":"Wireless Personal Communications"},{"issue":"17","key":"5005_CR26","doi-asserted-by":"crossref","first-page":"3492","DOI":"10.1016\/j.comnet.2013.08.003","volume":"57","author":"C Lai","year":"2013","unstructured":"Lai, C., Li, H., Lu, R., & Shen, X. S. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for lte networks. Computer Networks, 57(17), 3492\u20133510.","journal-title":"Computer Networks"},{"key":"5005_CR27","doi-asserted-by":"crossref","unstructured":"Park, Y., & Park, T. (2007). A survey of security threats on 4G networks. In 2007 IEEE Globecom Workshops, IEEE (pp. 1\u20136).","DOI":"10.1109\/GLOCOMW.2007.4437813"},{"key":"5005_CR28","doi-asserted-by":"crossref","unstructured":"Meyer, U., & Wetzel, S. (2004). A man-in-the-middle attack on UMTS. In Proceedings of the 3rd ACM workshop on wireless security. ACM (pp. 90\u201397).","DOI":"10.1145\/1023646.1023662"},{"issue":"17","key":"5005_CR29","doi-asserted-by":"crossref","first-page":"3282","DOI":"10.1002\/sec.1252","volume":"8","author":"J Cao","year":"2015","unstructured":"Cao, J., Ma, M., & Li, H. (2015). Gbaam: Group-based access authentication for MTC in LTE networks. Security and Communication Networks, 8(17), 3282\u20133299.","journal-title":"Security and Communication Networks"},{"key":"5005_CR30","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.comnet.2016.02.007","volume":"99","author":"C Lai","year":"2016","unstructured":"Lai, C., Lu, R., Zheng, D., Li, H., & Shen, X. S. (2016). GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Computer Networks, 99, 66\u201381.","journal-title":"Computer Networks"},{"issue":"3","key":"5005_CR31","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/JIOT.2015.2495321","volume":"3","author":"J Li","year":"2016","unstructured":"Li, J., Wen, M., & Zhang, T. (2016). Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet of Things Journal, 3(3), 408\u2013417.","journal-title":"IEEE Internet of Things Journal"},{"issue":"9","key":"5005_CR32","doi-asserted-by":"crossref","first-page":"1893","DOI":"10.1109\/TC.2012.251","volume":"62","author":"L Harn","year":"2013","unstructured":"Harn, L. (2013). Group authentication. IEEE Transactions on Computers, 62(9), 1893\u20131898.","journal-title":"IEEE Transactions on Computers"},{"key":"5005_CR33","unstructured":"Toorani, M., & Beheshti, A. A. (2010). An elliptic curve-based signcryption scheme with forward secrecy. ArXiv preprint arXiv:10051856 ."},{"key":"5005_CR34","doi-asserted-by":"crossref","unstructured":"Penrig, A., Song, D., & Tygar, D. (2001). ELK, a new protocol for efficient large-group key distribution. In Proceedings of the 2001 IEEE symposium on security and privacy, 2001 (S&P 2001). IEEE (pp. 247\u2013262).","DOI":"10.1109\/SECPRI.2001.924302"},{"key":"5005_CR35","doi-asserted-by":"crossref","unstructured":"Barker, E., Chen, L., Roginsky, A., & Smid, M. (2007). Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography. In Technical Report; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2006. 2012, Citeseer.","DOI":"10.6028\/NIST.SP.800-56ar"},{"key":"5005_CR36","doi-asserted-by":"crossref","unstructured":"Jung, K. R., Park, A., & Lee, S. (2010). Machine-type-communication (MTC) device grouping algorithm for congestion avoidance of MTC oriented LTE network. In Security-enriched urban computing and smart grid. Springer (pp. 167\u2013178).","DOI":"10.1007\/978-3-642-16444-6_22"},{"key":"5005_CR37","unstructured":"3GPP. (2009). Specification of the 3GPP confidentiality and integrity algorithms; document 1: f8 and f9 specification. TS 35201."},{"key":"5005_CR38","unstructured":"Blanchet, B. (2002). ProVerif: Cryptographic protocol verifier in the formal model. http:\/\/prosecco.gforge.inria.fr\/personal\/bblanche\/proverif\/ ."},{"key":"5005_CR39","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s11277-016-3672-3","volume":"93","author":"M Karuppiah","year":"2016","unstructured":"Karuppiah, M., Kumari, S., Li, X., Wu, F., Das, A. K., Khan, M. K., et al. (2016). A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 93, 383\u2013407.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"5005_CR40","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1007\/s11277-013-1309-3","volume":"74","author":"Q Xie","year":"2014","unstructured":"Xie, Q., Hu, B., Tan, X., Bao, M., & Yu, X. (2014). Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications, 74(2), 601\u2013614.","journal-title":"Wireless Personal Communications"},{"key":"5005_CR41","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.protcy.2015.10.018","volume":"21","author":"E Aravind","year":"2015","unstructured":"Aravind, E., Vasudevan, S. K., et al. (2015). Smart meter based on real time pricing. Procedia Technology, 21, 120\u2013124.","journal-title":"Procedia Technology"},{"issue":"3","key":"5005_CR42","doi-asserted-by":"crossref","first-page":"1981","DOI":"10.1007\/s11277-015-2551-7","volume":"84","author":"N Saxena","year":"2015","unstructured":"Saxena, N., Thomas, J., & Chaudhari, N. S. (2015). ES-AKA: An efficient and secure authentication and key agreement protocol for UMTS networks. Wireless Personal Communications, 84(3), 1981\u20132012.","journal-title":"Wireless Personal Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-5005-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5005-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5005-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T03:12:39Z","timestamp":1719544359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-5005-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,27]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["5005"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-5005-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,27]]}}}