PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks

被引:15
|
作者
Parne, Balu L. [1 ]
Gupta, Shubham [2 ]
Chaudhari, Narendra S. [3 ]
机构
[1] Vellore Inst Technol VIT AP Univ, Dept Comp Sci & Engn, Amaravati 522237, Andhra Pradesh, India
[2] Visvesvaraya Natl Inst Technol, Dept Comp Sci & Engn, Nagpur 440010, Maharashtra, India
[3] IIT, Dept Comp Sci & Engn, Indore 453552, Madhya Pradesh, India
关键词
LTE; LTE-A; Authentication; IoT; Privacy preservation; AVISPA; KFS; KBS; LTE; SERVICE; INTERNET; ISSUES; TOOL;
D O I
10.1007/s12083-019-00785-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the mobile telecommunication network, Long term Evolution (LTE) is the most successful technological development for the industrial services and applications. The Evolved Packet System based Authentication and Key Agreement (EPS-AKA) was the first protocol proposed to authenticate the communication entities in the LTE network. But, the EPS-AKA protocol suffers from the single key exposure problem and is susceptible to various security attacks. Also, the protocol incurs high bandwidth consumption and computation overhead over the communication network. Moreover, the protocol doesn't support the Internet of Things (IoT) based applications and has several security issues such as the privacy violation of the user identity and key set identifier (KSI). To resolve the above problems, various AKA protocols were proposed by the researchers. Unfortunately, none of the protocols succeeded to overcome the privacy preservation and single key exposure problem from the communication network. In this paper, we propose the performance and security enhanced (PSE-AKA) protocol for IoT enabled LTE/LTE-A network. The proposed protocol follows the cocktail therapy to generate the authentication vectors that improves the performance in terms of computation and communication overhead. The protocol preserves the privacy of objects, protects the KSI and avoids the identified attacks from the communication network. The formal verification and security analysis of the proposed protocol is carried out using the BAN logic and AVISPA tool respectively. The security analysis shows that the protocol achieves the security goals and secure against various known attacks. Finally, the performance analysis shows that the proposed protocol generates the less overhead and reduces the bandwidth consumption from the network.
引用
收藏
页码:1156 / 1177
页数:22
相关论文
共 50 条
  • [21] Authentication Protocol for an IoT-Enabled LTE Network
    Saxena, Neetesh
    Grijalva, Santiago
    Chaudhari, Narendra S.
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)
  • [22] A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks
    Garima Singh
    Deepti Shrimankar
    Sādhanā, 2018, 43
  • [23] A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks
    Singh, Garima
    Shrimankar, Deepti
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2018, 43 (08):
  • [24] An Efficient Authentication and Key Agreement Protocol for 4G (LTE) Networks
    Alezabi, Kamal Ali
    Hashim, Fazirulhisyam
    Hashim, Shaiful Jahari
    Ali, Borhanuddin M.
    2014 IEEE REGION 10 SYMPOSIUM, 2014, : 502 - 507
  • [25] Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks
    Li, Jinguo
    Wen, Mi
    Zhang, Tao
    IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (03): : 408 - 417
  • [26] Improving Security Level of LTE Authentication and Key Agreement Procedure
    Leu, Fang-Yie
    You, Ilsun
    Huang, Yi-Li
    Yim, Kangbin
    Dai, Cheng-Ru
    2012 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2012, : 1032 - 1036
  • [27] Enhanced Authentication Protocol for Improving Security in 3GPP LTE Networks
    Franklin, J. Vijay
    Paramasivam, K.
    INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 28 - 33
  • [28] Temporary Internet Access for Authentication and Key Agreement for LTE Networks
    Li, Xue Jun
    Ma, Maode
    Xie, Jiecheng
    SMART GRID AND INNOVATIVE FRONTIERS IN TELECOMMUNICATIONS, SMARTGIFT 2018, 2018, 245 : 1 - 10
  • [29] Enhanced Authentication and Key Agreement Protocol for Improving Security in UMTS Networks
    Ziani, Ahmed
    Medouri, Abdellatif
    2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 890 - 894
  • [30] Analyses authentication and key agreement (AKA) protocol for UMTS mobile networks
    AL-Saraireh, Ja'afer
    Yousef, Sufian
    MOBILE COMPUTING AND WIRELESS COMMUNICATION INTERNATIONAL CONFERENCE, PROCEEDINGS, 2007, : 46 - 50