A deep learning-based authentication protocol for IoT-enabled LTE systems

被引:2
|
作者
Rao, A. Sai Venkateshwar [1 ]
Roy, Prasanta Kumar [2 ]
Amgoth, Tarachand [1 ]
Bhattacharya, Ansuman [1 ]
机构
[1] Indian Inst Technol, Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
[2] Siliguri Inst Technol, Dept Comp Sci & Engn, Siliguri 734009, West Bengal, India
关键词
IoT-enabled LTE systems; Authentication and key agreement; Deep learning; Security; Privacy; KEY AGREEMENT PROTOCOL; SECURITY;
D O I
10.1016/j.future.2024.01.014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The connected devices in Internet -of -Things (IoT)-enabled systems are continuously increasing nowadays, and likely to grow exponentially worldwide in near future. Hence, the next generation IoT-enabled mobile networks (e.g., 5G onward) are expected to provide higher system capacity and ultra -low latency to deal with. According to the Third Generation Partnership Project (3GPP), Long -Term Evolution (LTE) technology can serve the purpose efficiently, and also bridge the gap between earlier and future generation mobile networks. However, the network may face problems associated with privacy and security, as the underlying communication is mostly wireless. Thus, a secure and efficient Authentication and Key Agreement (AKA) protocol is desirable. Recently, many protocols have been proposed to address these goals. Unfortunately, the security and efficiency of such protocols are still in doubt. This paper introduces a deep learning -based AKA protocol for IoT-enabled LTE systems. The proposed protocol can address mutual authentication among the communicating entities. It employs a Deep Residual Network (DRN)-based key generation technique, called DRN-KeyGen, to establish a shared secret key on -the -fly among the communicating entities in such environment where the number of IoT devices are excessively large and extremely heterogeneous in nature. The security of DRN-KeyGen is verified considering various active and passive attacks that may occur in wireless -enabled LTE systems. The efficiency of DRN-KeyGen is measured through two different parameters: attack detection rate and attack detection time, where each attack is experimented using Python tool -based simulation with varied key lengths. The empirical results show that the proposed DRN-KeyGen can achieve an average detection rate of 0.924 and an average detection time of 30.634 s considering key lengths of 32 bits, 64 bits, 128 bits, 192 bits, 256 bits, and 512 bits. Finally, we have compared the security and efficiency of DRN-KeyGen with other existing protocols to show its superiority.
引用
收藏
页码:451 / 464
页数:14
相关论文
共 50 条
  • [1] Authentication Protocol for an IoT-Enabled LTE Network
    Saxena, Neetesh
    Grijalva, Santiago
    Chaudhari, Narendra S.
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)
  • [2] Deep Learning-based Continuous Authentication for an IoT-enabled healthcare service
    Sahu, Amiya Kumar
    Sharma, Suraj
    Raja, Rohit
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [3] A Novel Authentication Protocol for IoT-Enabled Devices
    He, Daojing
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 867 - 876
  • [4] Deep learning-based power usage effectiveness optimization for IoT-enabled data center
    Sun, Yu
    Wang, Yanyi
    Jiang, Gaoxiang
    Cheng, Bo
    Zhou, Haibo
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (03) : 1702 - 1719
  • [5] Machine Learning-Based Data Analytics for IoT-Enabled Industry Automation
    Pandey, Sunil Kr
    Vanithamani, S.
    Shahare, Padmakar
    Ahmad, Sayed Sayeed
    Thilagamani, S.
    Hassan, Mohamed M.
    Amoatey, Enoch Tetteh
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [6] Machine learning-based fault detection scheme for IoT-enabled WSNs
    Shakunt, Pravindra Shekhar
    Udgata, Siba K.
    [J]. International Journal of Sensor Networks, 2024, 46 (02) : 61 - 72
  • [7] Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment
    Chen, Chien-Ming
    Chen, Zhaoting
    Kumari, Saru
    Obaidat, Mohammad S.
    Rodrigues, Joel J. P. C.
    Khan, Muhammad Khurram
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (14): : 25394 - 25412
  • [8] Overcoming cold start and sensor bias: A deep learning-based framework for IoT-enabled monitoring applications
    Shurrab, Mohammed
    Mahboobeh, Dunia
    Mizouni, Rabeb
    Singh, Shakti
    Otrok, Hadi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 222
  • [9] Deep learning-based optimization of energy utilization in IoT-enabled smart cities: A pathway to sustainable development
    Aljohani, Abeer
    [J]. ENERGY REPORTS, 2024, 12 : 2946 - 2957
  • [10] A Two-Stage Transfer Learning-Based Deep Learning Approach for Production Progress Prediction in IoT-Enabled Manufacturing
    Huang, Shaohua
    Guo, Yu
    Liu, Daoyuan
    Zha, Shanshan
    Fang, Weiguang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 10627 - 10638