PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks

被引:15
|
作者
Parne, Balu L. [1 ]
Gupta, Shubham [2 ]
Chaudhari, Narendra S. [3 ]
机构
[1] Vellore Inst Technol VIT AP Univ, Dept Comp Sci & Engn, Amaravati 522237, Andhra Pradesh, India
[2] Visvesvaraya Natl Inst Technol, Dept Comp Sci & Engn, Nagpur 440010, Maharashtra, India
[3] IIT, Dept Comp Sci & Engn, Indore 453552, Madhya Pradesh, India
关键词
LTE; LTE-A; Authentication; IoT; Privacy preservation; AVISPA; KFS; KBS; LTE; SERVICE; INTERNET; ISSUES; TOOL;
D O I
10.1007/s12083-019-00785-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the mobile telecommunication network, Long term Evolution (LTE) is the most successful technological development for the industrial services and applications. The Evolved Packet System based Authentication and Key Agreement (EPS-AKA) was the first protocol proposed to authenticate the communication entities in the LTE network. But, the EPS-AKA protocol suffers from the single key exposure problem and is susceptible to various security attacks. Also, the protocol incurs high bandwidth consumption and computation overhead over the communication network. Moreover, the protocol doesn't support the Internet of Things (IoT) based applications and has several security issues such as the privacy violation of the user identity and key set identifier (KSI). To resolve the above problems, various AKA protocols were proposed by the researchers. Unfortunately, none of the protocols succeeded to overcome the privacy preservation and single key exposure problem from the communication network. In this paper, we propose the performance and security enhanced (PSE-AKA) protocol for IoT enabled LTE/LTE-A network. The proposed protocol follows the cocktail therapy to generate the authentication vectors that improves the performance in terms of computation and communication overhead. The protocol preserves the privacy of objects, protects the KSI and avoids the identified attacks from the communication network. The formal verification and security analysis of the proposed protocol is carried out using the BAN logic and AVISPA tool respectively. The security analysis shows that the protocol achieves the security goals and secure against various known attacks. Finally, the performance analysis shows that the proposed protocol generates the less overhead and reduces the bandwidth consumption from the network.
引用
收藏
页码:1156 / 1177
页数:22
相关论文
共 50 条
  • [31] REPS-AKA3: A secure authentication and re- authentication protocol for LTE networks
    Mobarhan, Mostafa Ayoubi
    Salamah, Mohammed
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 201
  • [32] A Secure Group-based Authentication Protocol for Machine-type Communication in LTE/LTE-A Networks
    Ashkejanpahlouie, Farshad Khoshroo
    Talouki, Maede Ashouri
    Ghahfarokhi, Behrouz Shahgholi
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SMART CITIES AND INTERNET OF THINGS (SCIOT'18), 2018,
  • [33] A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks
    Fu, Anmin
    Song, Jianye
    Li, Shuai
    Zhang, Gongxuan
    Zhang, Yuqing
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2002 - 2014
  • [34] On the security of an enhanced UMTS authentication and key agreement protocol
    Hwang, Min-Shiang
    Chong, Song-Kong
    Ou, Hsia-Hung
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2011, 22 (03): : 99 - 112
  • [35] A Group-based Authentication and Key Agreement for MTC in LTE Networks
    Cao, Jin
    Ma, Maode
    Li, Hui
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1017 - 1022
  • [36] A GAA-based batch authentication and key agreement for LTE networks
    Zhang, Wujun
    Wang, Xiaohui
    Zhou, Yunya
    Deng, Hua
    Wang, Yumin
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 289 - 295
  • [37] The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks
    Fei, Teng
    Wang, Wenye
    COMPUTER NETWORKS, 2023, 228
  • [38] A Security Enhanced Train to Ground Wireless Communication Authentication Key Agreement Scheme for LTE-R
    Wu W.
    Zhang W.
    Wang X.
    Wang Y.
    Tiedao Xuebao/Journal of the China Railway Society, 2019, 41 (12): : 66 - 74
  • [39] SRGH: A secure and robust group-based handover AKA protocol for MTC in LTE-A networks
    Gupta, Shubham
    Parne, Balu L.
    Chaudhari, Narendra S.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (08)
  • [40] A deep learning-based authentication protocol for IoT-enabled LTE systems
    Rao, A. Sai Venkateshwar
    Roy, Prasanta Kumar
    Amgoth, Tarachand
    Bhattacharya, Ansuman
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 154 : 451 - 464