[1] |
WANG Y P E , LIN X Q , ADHIKARY A ,et al. A primer on 3GPP narrowband Internet of things[J]. IEEE Communications Magazine, 2017,55(3): 117-123.
|
[2] |
ZAYAS A D , MERINO P . The 3GPP NB-IoT system architecture for the Internet of things[C]// Proceedings of 2017 IEEE International Conference on Communications Workshops (ICC Workshops). Piscataway:IEEE Press, 2017: 277-282.
|
[3] |
SHI J , JIN L P , LI J ,et al. A smart parking system based on NB-IoT and third-party payment platform[C]// Proceedings of 2017 17th International Symposium on Communications and Information Technologies (ISCIT). Piscataway:IEEE Press, 2017: 1-5.
|
[4] |
LI Y K , CHENG X , CAO Y ,et al. Smart choice for the smart grid:narrowband Internet of things (NB-IoT)[J]. IEEE Internet of Things Journal, 2018,5(3): 1505-1515.
|
[5] |
ZHANG H B , LI J P , WEN B ,et al. Connecting intelligent things in smart hospitals using NB-IoT[J]. IEEE Internet of Things Journal, 2018,5(3): 1550-1560.
|
[6] |
CHEN Y W , WANG J T , CHI K H ,et al. Group-based authentication and key agreement[J]. Wireless Personal Communications, 2012,62(4): 965-979.
|
[7] |
ZHANG Y Y , CHEN J , LI H ,et al. Group-based authentication and key agreement for machine-type communication[J]. International Journal of Grid and Utility Computing, 2014,5(2): 87.
|
[8] |
LAI C Z , LI H , LI X Q ,et al. A novel group access authentication and key agreement protocol for machine-type communication[J]. Transactions on Emerging Telecommunications Technologies, 2015,26(3): 414-431.
|
[9] |
LAI C Z , LI H , LU R X ,et al. SE-AKA:a secure and efficient group authentication and key agreement protocol for LTE networks[J]. Computer Networks, 2013,57(17): 3492-3510.
|
[10] |
JIANG R , LAI C Z , LUO J ,et al. EAP-based group authentication and key agreement protocol for machine-type communications[J]. International Journal of Distributed Sensor Networks, 2013,9(11): 304601.
|
[11] |
LAI C Z , LI H , LU R X ,et al. LGTH:a lightweight group authentication protocol for machine-type communication in LTE networks[C]// Proceedings of 2013 IEEE Global Communications Conference (GLOBECOM). Piscataway:IEEE Press, 2013: 832-837.
|
[12] |
CAO J , MA M D , LI H . GBAAM:group-based access authentication for MTC in LTE networks[J]. Security and Communication Networks, 2015,8(17): 3282-3299.
|
[13] |
LI J G , WEN M , ZHANG T . Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks[J]. IEEE Internet of Things Journal, 2016,3(3): 408-417.
|
[14] |
LAI C Z , LI H , LU R X ,et al. SEGR:a secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks[C]// Proceedings of 2014 IEEE International Conference on Communications (ICC). Piscataway:IEEE Press, 2014: 1011-1016.
|
[15] |
LAI C Z , LU R X , ZHENG D ,et al. GLARM:group-based lightweight authentication scheme for resource-constrained machine to machine communications[J]. Computer Networks, 2016,99: 66-81.
|
[16] |
REN X P , CAO J , MA M D ,et al. A novel PUF-based group authentication and data transmission scheme for NB-IoT in 3GPP 5G networks[J]. IEEE Internet of Things Journal, 2021,PP(99): 1.
|
[17] |
CAO J , YU P , MA M D ,et al. Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network[J]. IEEE Internet of Things Journal, 2019,6(2): 1561-1575.
|
[18] |
ZHANG Y H , REN F Y , WU A ,et al. Certificateless multi-party authenticated encryption for NB-IoT terminals in 5G networks[J]. IEEE Access, 2019,7: 114721-114730.
|
[19] |
YU P , CAO J , MA M D ,et al. Quantum-resistance authentication and data transmission scheme for NB-IoT in 3GPP 5G networks[C]// Proceedings of 2019 IEEE Wireless Communications and Networking Conference (WCNC). Piscataway:IEEE Press, 2019: 1-7.
|
[20] |
CAO J , YU P , XIANG X Y ,et al. Anti-quantum fast authentication and data transmission scheme for massive devices in 5G NB-IoT system[J]. IEEE Internet of Things Journal, 2019,6(6): 9794-9805.
|
[21] |
MAXWELL G , POELSTRA A , SEURIN Y ,et al. Simple Schnorr multi-signatures with applications to Bitcoin[J]. Designs,Codes and Cryptography, 2019,87(9): 2139-2164.
|
[22] |
NI J B , LIN X D , SHEN X S . Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT[J]. IEEE Journal on Selected Areas in Communications, 2018,36(3): 644-657.
|
[23] |
VIJAYAKUMAR P , BOSE S D , KANNAN A . Chinese remainder Theorem based centralised group key management for secure multicast communication[J]. IET Information Security, 2014,8(3): 179-187.
|
[24] |
MAURYA A K , SASTRY V N . User authentication scheme for wireless sensor networks and Internet of things using Chinese remainder theorem[C]// Communications in Computer and Information Science. Singapore:Springer Singapore, 2017: 79-94.
|
[25] |
ZHANG J , CUI J , ZHONG H ,et al. PA-CRT:Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(2): 722-735.
|
[26] |
KUNG Y H , HSIAO H C . GroupIt:lightweight group key management for dynamic IoT environments[J]. IEEE Internet of Things Journal, 2018,5(6): 5155-5165.
|
[27] |
KOBLITZ N , MENEZES A , VANSTONE S . The state of elliptic curve cryptography[J]. Designs,Codes and Cryptography, 2000,19(2/3): 173-193.
|
[28] |
SCHNORR C P , . Efficient identification and signatures for smart cards[C]// Conference on the Theory and Application of Cryptology. Berlin:Springer, 1989: 239-252.
|
[29] |
POINTCHEVAL D , STERN J . Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000,13(3): 361-396.
|
[30] |
SCHNORR C P . Efficient signature generation by smart cards[J]. Journal of Cryptology, 1991,4(3): 161-174.
|