REPS-AKA5: A robust group-based authentication protocol for IoT applications in LTE system

被引:9
|
作者
Mobarhan, Mostafa Ayoubi [1 ]
Salamah, Muhammed [1 ]
机构
[1] Eastern Mediterranean Univ, Fac Engn, Dept Comp Engn, KKTC, Via Mersin 10, Famagusta, Turkiye
关键词
M2M communication; LTE Security; AVISPA tool; BAN logic; Scyther verification tool; Group-based authentication and IoT systems; KEY AGREEMENT PROTOCOL; MACHINE-TYPE COMMUNICATIONS; GROUP BASED EFFICIENT; SECURITY; MTC; CHALLENGES; SCHEME;
D O I
10.1016/j.iot.2023.100700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, Internet of Things systems connect several smart devices to provide required services. The IoT applications employ Machine Type Communications to meet the requirements of IoT applications. In such systems, one of the most important challenges is providing a proper security level for each IoT device. The LTE network is an appropriate network for IoT systems. One of the most important objectives in an LTE-enabled IoT network is to manage a great number of IoT devices with a high level of security. In addition, when plenty of IoT devices connect to the LTE system simultaneously, all the IoT devices need to run a full AKA process, which might make problematic signaling congestion. Thus, supporting a huge number of IoT nodes (i.e., devices) is a fundamental requirement of IoT systems. In this paper, taking into consideration the important performance and security issues, we suggest a lightweight group-based AKA protocol for IoT applications called Robust Evolved Packet System-Authentication and Key Agreement 5 (REPSAKA5) protocol. The proposed method presents a strong mutual authentication between all involved nodes. In addition, the suggested approach presents considerable confidentiality in the data/control plan using an optimized combination of symmetric and asymmetric keys. By the proposed method, a huge number of IoT devices can be simultaneously verified by the LTE system. We verified the proposed AKA method by using the AVISPA tool and BAN logic, Scyther tool to check that the REPS-AKA5 method is resistant to different known security attacks. Furthermore, the obtained results show that the proposed method provides better performance compared with other AKA methods in terms of computational cost, storage overhead, bandwidth consumption, and signaling overhead. Hence, the REPS-AKA5 approach is able to achieve not only defined security requirements but also a considerable improvement in network performance.
引用
收藏
页数:39
相关论文
共 50 条
  • [1] SRGH: A secure and robust group-based handover AKA protocol for MTC in LTE-A networks
    Gupta, Shubham
    Parne, Balu L.
    Chaudhari, Narendra S.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (08)
  • [2] REPS-AKA3: A secure authentication and re- authentication protocol for LTE networks
    Mobarhan, Mostafa Ayoubi
    Salamah, Mohammed
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 201
  • [3] A Novel Group-Based Authentication and Key Agreement Protocol for IoT Enabled LTE/LTE-A Network
    Adhikari, Mou
    Panda, Prabhat Kumar
    Chattopadhyay, Sudipta
    Majumdar, Suvaditya
    2020 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS SIGNAL PROCESSING AND NETWORKING (WISPNET), 2020, : 168 - 172
  • [4] A Secure Group-based Authentication Protocol for Machine-type Communication in LTE/LTE-A Networks
    Ashkejanpahlouie, Farshad Khoshroo
    Talouki, Maede Ashouri
    Ghahfarokhi, Behrouz Shahgholi
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SMART CITIES AND INTERNET OF THINGS (SCIOT'18), 2018,
  • [5] GAHAP: A Group-based Anonymity Handover Authentication Protocol for MTC in LTE-A Networks
    Cao, Jin
    Li, Hui
    Ma, Maode
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 3020 - 3025
  • [6] A Survey of Performance Improvement by Group-Based Authentication in IoT
    Su, Wei-Tsung
    Wong, Wei-Ming
    Chen, Wei-Cheng
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION (ICASI), 2016,
  • [7] The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks
    Fei, Teng
    Wang, Wenye
    COMPUTER NETWORKS, 2023, 228
  • [8] A Group-based Authentication and Key Agreement for MTC in LTE Networks
    Cao, Jin
    Ma, Maode
    Li, Hui
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1017 - 1022
  • [9] GBAAM: group-based access authentication for MTC in LTE networks
    Cao, Jin
    Ma, Maode
    Li, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3282 - 3299
  • [10] SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
    Lai, Chengzhe
    Li, Hui
    Lu, Rongxing
    Shen, Xuemin
    COMPUTER NETWORKS, 2013, 57 (17) : 3492 - 3510