PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks

被引:15
|
作者
Parne, Balu L. [1 ]
Gupta, Shubham [2 ]
Chaudhari, Narendra S. [3 ]
机构
[1] Vellore Inst Technol VIT AP Univ, Dept Comp Sci & Engn, Amaravati 522237, Andhra Pradesh, India
[2] Visvesvaraya Natl Inst Technol, Dept Comp Sci & Engn, Nagpur 440010, Maharashtra, India
[3] IIT, Dept Comp Sci & Engn, Indore 453552, Madhya Pradesh, India
关键词
LTE; LTE-A; Authentication; IoT; Privacy preservation; AVISPA; KFS; KBS; LTE; SERVICE; INTERNET; ISSUES; TOOL;
D O I
10.1007/s12083-019-00785-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the mobile telecommunication network, Long term Evolution (LTE) is the most successful technological development for the industrial services and applications. The Evolved Packet System based Authentication and Key Agreement (EPS-AKA) was the first protocol proposed to authenticate the communication entities in the LTE network. But, the EPS-AKA protocol suffers from the single key exposure problem and is susceptible to various security attacks. Also, the protocol incurs high bandwidth consumption and computation overhead over the communication network. Moreover, the protocol doesn't support the Internet of Things (IoT) based applications and has several security issues such as the privacy violation of the user identity and key set identifier (KSI). To resolve the above problems, various AKA protocols were proposed by the researchers. Unfortunately, none of the protocols succeeded to overcome the privacy preservation and single key exposure problem from the communication network. In this paper, we propose the performance and security enhanced (PSE-AKA) protocol for IoT enabled LTE/LTE-A network. The proposed protocol follows the cocktail therapy to generate the authentication vectors that improves the performance in terms of computation and communication overhead. The protocol preserves the privacy of objects, protects the KSI and avoids the identified attacks from the communication network. The formal verification and security analysis of the proposed protocol is carried out using the BAN logic and AVISPA tool respectively. The security analysis shows that the protocol achieves the security goals and secure against various known attacks. Finally, the performance analysis shows that the proposed protocol generates the less overhead and reduces the bandwidth consumption from the network.
引用
收藏
页码:1156 / 1177
页数:22
相关论文
共 50 条
  • [41] An LTE Authentication and Key Agreement Protocol Based on the ECC Self-Certified Public Key
    Lu, Xiaofeng
    Yang, Fan
    Zou, Luwen
    Lio, Pietro
    Hui, Pan
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (03) : 1101 - 1116
  • [42] Scheduling Impact on the Performance of Relay-Enhanced LTE-A Networks
    Minelli, Mattia
    Ma, Maode
    Coupechoux, Marceau
    Godlewski, Philippe
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (04) : 2496 - 2508
  • [43] GAHAP: A Group-based Anonymity Handover Authentication Protocol for MTC in LTE-A Networks
    Cao, Jin
    Li, Hui
    Ma, Maode
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 3020 - 3025
  • [44] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Neetesh Saxena
    Jaya Thomas
    Narendra S. Chaudhari
    Wireless Personal Communications, 2015, 84 : 1981 - 2012
  • [45] S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks
    Huang, Yu-Lun
    Shen, Chih-Ya
    Shieh, Shiuhpyng Winston
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (09) : 4509 - 4519
  • [46] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Saxena, Neetesh
    Thomas, Jaya
    Chaudhari, Narendra S.
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 1981 - 2012
  • [47] Group Security Authentication and Key Agreement Protocol Built by Elliptic Curve Diffie Hellman Key Exchange for LTE Military Grade Communication
    Moussa, Karim H.
    El-Sakka, Ahmed H.
    Shaaban, Shawky
    Kheirallah, Hassan Nadir
    IEEE ACCESS, 2022, 10 : 80352 - 80364
  • [48] REPS-AKA5: A robust group-based authentication protocol for IoT applications in LTE system
    Mobarhan, Mostafa Ayoubi
    Salamah, Muhammed
    INTERNET OF THINGS, 2023, 22
  • [49] A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid
    Wu, Yapeng
    Guo, Hua
    Han, Yiran
    Li, Sijia
    Liu, Jianwei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (09) : 11449 - 11457
  • [50] An Enhanced EAB Algorithm to Reduce RACH Congestion Due to IoT Traffic in LTE-A Networks
    Giluka, Mukesh Kumar
    Priyadarshi, Tathagat
    Kumar, Shakti
    Franklin, Antony A.
    Tamma, Bheemarjuna Reddy
    2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 395 - 400