A deep learning-based authentication protocol for IoT-enabled LTE systems

被引:2
|
作者
Rao, A. Sai Venkateshwar [1 ]
Roy, Prasanta Kumar [2 ]
Amgoth, Tarachand [1 ]
Bhattacharya, Ansuman [1 ]
机构
[1] Indian Inst Technol, Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
[2] Siliguri Inst Technol, Dept Comp Sci & Engn, Siliguri 734009, West Bengal, India
关键词
IoT-enabled LTE systems; Authentication and key agreement; Deep learning; Security; Privacy; KEY AGREEMENT PROTOCOL; SECURITY;
D O I
10.1016/j.future.2024.01.014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The connected devices in Internet -of -Things (IoT)-enabled systems are continuously increasing nowadays, and likely to grow exponentially worldwide in near future. Hence, the next generation IoT-enabled mobile networks (e.g., 5G onward) are expected to provide higher system capacity and ultra -low latency to deal with. According to the Third Generation Partnership Project (3GPP), Long -Term Evolution (LTE) technology can serve the purpose efficiently, and also bridge the gap between earlier and future generation mobile networks. However, the network may face problems associated with privacy and security, as the underlying communication is mostly wireless. Thus, a secure and efficient Authentication and Key Agreement (AKA) protocol is desirable. Recently, many protocols have been proposed to address these goals. Unfortunately, the security and efficiency of such protocols are still in doubt. This paper introduces a deep learning -based AKA protocol for IoT-enabled LTE systems. The proposed protocol can address mutual authentication among the communicating entities. It employs a Deep Residual Network (DRN)-based key generation technique, called DRN-KeyGen, to establish a shared secret key on -the -fly among the communicating entities in such environment where the number of IoT devices are excessively large and extremely heterogeneous in nature. The security of DRN-KeyGen is verified considering various active and passive attacks that may occur in wireless -enabled LTE systems. The efficiency of DRN-KeyGen is measured through two different parameters: attack detection rate and attack detection time, where each attack is experimented using Python tool -based simulation with varied key lengths. The empirical results show that the proposed DRN-KeyGen can achieve an average detection rate of 0.924 and an average detection time of 30.634 s considering key lengths of 32 bits, 64 bits, 128 bits, 192 bits, 256 bits, and 512 bits. Finally, we have compared the security and efficiency of DRN-KeyGen with other existing protocols to show its superiority.
引用
收藏
页码:451 / 464
页数:14
相关论文
共 50 条
  • [31] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huihui Huang
    Siqi Lu
    Zehui Wu
    Qiang Wei
    [J]. EURASIP Journal on Wireless Communications and Networking, 2021
  • [32] Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Kaur, Damandeep
    Saini, Khushil Kumar
    Kumar, Devender
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (27) : 39367 - 39385
  • [33] A Multi-Phase SMO-Based MAC Protocol for IoT-Enabled WBAN Systems
    Kumar, Sachin
    Verma, Pawan Kumar
    [J]. IETE JOURNAL OF RESEARCH, 2023, 70 (07) : 5985 - 5998
  • [34] Energy Efficient Priority-Based Hybrid MAC Protocol for IoT-Enabled WBAN Systems
    Olatinwo, Damilola D.
    Abu-Mahfouz, Adnan M.
    Hancke, Gerhard P.
    Myburgh, Hermanus C.
    [J]. IEEE SENSORS JOURNAL, 2023, 23 (12) : 13524 - 13538
  • [35] Seamless privacy-preservation and authentication framework for IoT-enabled smart eHealth systems
    Deebak, B. D.
    Memon, Fida Hussain
    Cheng, Xiaochun
    Dev, Kapal
    Hu, Jia
    Khowaja, Sunder Ali
    Qureshi, Nawab Muhammad Faseeh
    Choi, Kyung Huyn
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2022, 80
  • [36] Teamwork Optimization with Deep Learning Based Fall Detection for IoT-Enabled Smart Healthcare System
    Basahel, Sarah B.
    Bajaba, Saleh
    Yamin, Mohammad
    Mohanty, Sachi Nandan
    Lydia, E. Laxmi
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 1353 - 1369
  • [37] Deep Learning-Based Privacy Preservation and Data Analytics for IoT Enabled Healthcare
    Bi, Hongliang
    Liu, Jiajia
    Kato, Nei
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (07) : 4798 - 4807
  • [38] A Comprehensive Survey on Machine Learning-Based Big Data Analytics for IoT-Enabled Smart Healthcare System
    Wei Li
    Yuanbo Chai
    Fazlullah Khan
    Syed Rooh Ullah Jan
    Sahil Verma
    Varun G. Menon
    Xingwang Kavita
    [J]. Mobile Networks and Applications, 2021, 26 : 234 - 252
  • [39] A Comprehensive Survey on Machine Learning-Based Big Data Analytics for IoT-Enabled Smart Healthcare System
    Li, Wei
    Chai, Yuanbo
    Khan, Fazlullah
    Jan, Syed Rooh Ullah
    Verma, Sahil
    Menon, Varun G.
    Kavita
    Li, Xingwang
    [J]. MOBILE NETWORKS & APPLICATIONS, 2021, 26 (01): : 234 - 252
  • [40] A Hybrid Multi-Class MAC Protocol for IoT-Enabled WBAN Systems
    Olatinwo, Damilola D.
    Abu-Mahfouz, Adnan M.
    Hancke, Gerhard P.
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (05) : 6761 - 6774