Font Size: a A A

Research On M2M Access Technology In Next Generation Mobile Communication System

Posted on:2018-10-31Degree:MasterType:Thesis
Country:ChinaCandidate:X T ZhangFull Text:PDF
GTID:2348330518995583Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
The access of M2M (Machine to Machine) devices to mobile communication systems provides services for people anytime and anywhere, having vast market prospects. The access of a large number of M2M devices will cause network congestion problems. How to make them have better access and authentication performance has been a hotspot.Aiming at the network congestion caused by' a large number of M2M devices simultaneously initiating network access, the paper focuses on business characteristics of M2M communications, random access and user authentication process. First, the M2M devices are divided into different priority groups to dynamically calculate the access barring factor of each priority devices, controlling the probability of M2M device random access initiation. Then, based on the grouping characteristics of the M2M devices, the collision probability of devices access is reduced by grouping the M2M devices dynamically. Finally, Diffie-Hellman algorithm is studied and group characteristics are combined to realize an authentication mechanism being more secure, and with fewer signaling capacity. The main contributions and innovation points are listed below.(1) A M2M random access dynamic barring (Random Access Dynamic Barring, RADB) scheme is proposed. By dividing the priority of the M2M devices into the access class, the access conditions of the current network M2M devices can be known, and calculates the access barring factor dynamically so as to control the probability of the random access of each priority device. The simulation results show that the RADB scheme can improve the access success rate of M2M devices,reduce the collision probability and improve the access performance of M2M devices.(2) A dynamic random access scheme based on M2M grouping is proposed. By analyzing the process of the random access of M2M devices and the business characteristics of M2M devices, the process of M2M devices grouping process was designed and the process of random access of M2M devices in group form was determined. The simulation results show that the scheme can further improve the access success rate and reduce the collision probability.(3) An authentication mechanism of M2M devices group based on Diffie-Hellman algorithm is proposed: DHG-AKA (Diffie-Hellman Group AKA) and DHSAG-AKA (Diffie-Hellman Signaling Aggregation Group AKA) mechanism. In order to realize the security-enhanced M2M device group authentication mechanism, the technology of aggregated message authentication code is adopted, and Diffie-Hellman key exchange algorithm is used to protect the important parameters. The mechanism also provides a method for updating the group information.Compared with the existing EPS-AKA (Evolved Packet System Authentication and Key Agreement), privacy protection is reinforced, and group authentication is supported with greatly reducing the number of signaling in the authentication process.
Keywords/Search Tags:M2M communication, random access, access barring, authentication and key agreement
PDF Full Text Request
Related items