{"id":"https://openalex.org/W2085002292","doi":"https://doi.org/10.1155/2013/304601","title":"EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications","display_name":"EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications","publication_year":2013,"publication_date":"2013-11-01","ids":{"openalex":"https://openalex.org/W2085002292","doi":"https://doi.org/10.1155/2013/304601","mag":"2085002292"},"language":"en","primary_location":{"id":"doi:10.1155/2013/304601","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2013/304601","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1155/2013/304601","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journals.sagepub.com/doi/pdf/10.1155/2013/304601","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091107196","display_name":"Rong Jiang","orcid":"https://orcid.org/0000-0003-4160-8349"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CA","CN"],"is_corresponding":true,"raw_author_name":"Rong Jiang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada, N2L 3G1","School of Computer, National University of Defense Technology, Changsha 410073, China","1 School of Computer, National University of Defense Technology, Changsha 410073, China","2 Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada, N2L 3G1"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada, N2L 3G1","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"School of Computer, National University of Defense Technology, Changsha 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"1 School of Computer, National University of Defense Technology, Changsha 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"2 Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada, N2L 3G1","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085049261","display_name":"Chengzhe Lai","orcid":"https://orcid.org/0000-0002-4603-3380"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA","CN"],"is_corresponding":false,"raw_author_name":"Chengzhe Lai","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada, N2L 3G1","State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an 710071, China","2 Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada, N2L 3G1","3 State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an 710071, China"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada, N2L 3G1","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"2 Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada, N2L 3G1","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"3 State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081222445","display_name":"Jun Luo","orcid":"https://orcid.org/0000-0002-7036-5158"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Luo","raw_affiliation_strings":["School of Computer, National University of Defense Technology, Changsha 410073, China","1 School of Computer, National University of Defense Technology, Changsha 410073, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology, Changsha 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"1 School of Computer, National University of Defense Technology, Changsha 410073, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100459925","display_name":"Xiaoping Wang","orcid":"https://orcid.org/0000-0002-8853-8926"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoping Wang","raw_affiliation_strings":["School of Computer, National University of Defense Technology, Changsha 410073, China","1 School of Computer, National University of Defense Technology, Changsha 410073, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology, Changsha 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"1 School of Computer, National University of Defense Technology, Changsha 410073, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100370987","display_name":"Hong Wang","orcid":"https://orcid.org/0000-0003-2224-6813"},"institutions":[{"id":"https://openalex.org/I180632629","display_name":"Xi'an International Studies University","ror":"https://ror.org/05gcme754","country_code":"CN","type":"education","lineage":["https://openalex.org/I180632629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Wang","raw_affiliation_strings":["Xi'an Communication Institute, Xi'an 710106, China","4 Xi'an Communication Institute, Xi'an 710106, China"],"affiliations":[{"raw_affiliation_string":"Xi'an Communication Institute, Xi'an 710106, China","institution_ids":["https://openalex.org/I180632629"]},{"raw_affiliation_string":"4 Xi'an Communication Institute, Xi'an 710106, China","institution_ids":["https://openalex.org/I180632629"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5091107196"],"corresponding_institution_ids":["https://openalex.org/I151746483","https://openalex.org/I170215575"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200},"apc_paid":{"value":2200,"currency":"USD","value_usd":2200},"fwci":2.262,"has_fulltext":false,"cited_by_count":62,"citation_normalized_percentile":{"value":0.89529511,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"9","issue":"11","first_page":"304601","last_page":"304601"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8515901565551758},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.582979142665863},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5128982067108154},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.48069268465042114},{"id":"https://openalex.org/keywords/machine-to-machine","display_name":"Machine to machine","score":0.4541560411453247},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4524562954902649},{"id":"https://openalex.org/keywords/otway\u2013rees-protocol","display_name":"Otway\u2013Rees protocol","score":0.43583446741104126},{"id":"https://openalex.org/keywords/aka","display_name":"AKA","score":0.4274168014526367},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.3532223105430603},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3019545078277588},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08987763524055481},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.07802069187164307}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8515901565551758},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.582979142665863},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5128982067108154},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.48069268465042114},{"id":"https://openalex.org/C76763059","wikidata":"https://www.wikidata.org/wiki/Q251072","display_name":"Machine to machine","level":3,"score":0.4541560411453247},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4524562954902649},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.43583446741104126},{"id":"https://openalex.org/C121158502","wikidata":"https://www.wikidata.org/wiki/Q4652161","display_name":"AKA","level":2,"score":0.4274168014526367},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.3532223105430603},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3019545078277588},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08987763524055481},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.07802069187164307},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2013/304601","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2013/304601","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1155/2013/304601","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:sae:intdis:v:9:y:2013:i:11:p:304601","is_oa":false,"landing_page_url":"https://journals.sagepub.com/doi/10.1155/2013/304601","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:114569d2871f459badc7eb40f70462df","is_oa":true,"landing_page_url":"https://doaj.org/article/114569d2871f459badc7eb40f70462df","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Distributed Sensor Networks, Vol 9 (2013)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2013/304601","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2013/304601","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1155/2013/304601","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3694898803","display_name":null,"funder_award_id":"61170261","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5398434182","display_name":null,"funder_award_id":"61170261","funder_id":"https://openalex.org/F4320322725","funder_display_name":"China Scholarship Council"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321108","display_name":"Academy of Finland","ror":"https://ror.org/05k73zm37"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2085002292.pdf","grobid_xml":"https://content.openalex.org/works/W2085002292.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W189916820","https://openalex.org/W1972627848","https://openalex.org/W1976704200","https://openalex.org/W1985523998","https://openalex.org/W1986802133","https://openalex.org/W1988350818","https://openalex.org/W2003736153","https://openalex.org/W2005208104","https://openalex.org/W2020176320","https://openalex.org/W2036378739","https://openalex.org/W2040049909","https://openalex.org/W2041547341","https://openalex.org/W2096281186","https://openalex.org/W2097422349","https://openalex.org/W2119142431","https://openalex.org/W2121404349","https://openalex.org/W2129031524","https://openalex.org/W2131487642","https://openalex.org/W2133432179","https://openalex.org/W2166659560","https://openalex.org/W2234370308","https://openalex.org/W2460086402","https://openalex.org/W2913761579","https://openalex.org/W2958921429"],"related_works":["https://openalex.org/W2362963703","https://openalex.org/W2388247877","https://openalex.org/W2379241680","https://openalex.org/W2133761101","https://openalex.org/W2354152081","https://openalex.org/W2127299350","https://openalex.org/W2170402725","https://openalex.org/W2386088395","https://openalex.org/W1629593159","https://openalex.org/W2348375952"],"abstract_inverted_index":{"Machine":[0],"to":[1,32,103],"machine":[2],"(M2M)":[3],"communications,":[4],"also":[5],"called":[6,54],"machine-type":[7,57],"communications":[8,58],"(MTC),":[9],"has":[10,84],"widely":[11],"been":[12],"utilized":[13],"in":[14,93,110,129],"applications":[15],"such":[16],"as":[17],"telemetry,":[18],"industrial,":[19],"automation,":[20],"and":[21,50,77,97,101,138],"SCADA":[22],"systems.":[23],"The":[24],"group-based":[25],"MTC,":[26],"especially":[27],"when":[28],"MTC":[29],"devices":[30],"belong":[31],"non-3GPP":[33],"network,":[34],"will":[35],"face":[36],"new":[37],"challenge":[38],"of":[39,95,131],"access":[40],"authentication.":[41],"In":[42],"this":[43],"paper,":[44],"we":[45],"propose":[46],"a":[47],"group":[48,98],"authentication":[49],"key":[51],"agreement":[52],"protocol,":[53],"EG-AKA,":[55],"for":[56],"combining":[59],"elliptic":[60],"curve":[61],"Diffie-Hellman":[62],"(ECDH)":[63],"based":[64],"on":[65],"EAP":[66],"framework.":[67],"Compared":[68],"with":[69],"conventional":[70],"EAP-AKA,":[71],"our":[72],"protocol":[73,90,116],"guarantees":[74],"stronger":[75],"security":[76,82],"provides":[78],"better":[79],"performance.":[80],"Detailed":[81],"analysis":[83],"shown":[85],"that":[86,113],"the":[87,114,132,135,139],"proposed":[88,115],"EG-AKA":[89],"is":[91,117],"secure":[92,118],"terms":[94,130],"user":[96],"identity":[99],"protection":[100],"resistance":[102],"several":[104],"attacks.":[105,122],"Furthermore,":[106],"formal":[107],"verification":[108],"implemented":[109],"AVISPA":[111],"proves":[112],"against":[119],"various":[120],"malicious":[121],"Moreover,":[123],"performance":[124],"evaluation":[125],"demonstrates":[126],"its":[127],"efficiency":[128],"signaling":[133],"overhead,":[134],"bandwidth":[136],"consumption,":[137],"transmission":[140],"cost.":[141]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":12},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
