PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks

被引:15
作者
Parne, Balu L. [1 ]
Gupta, Shubham [2 ]
Chaudhari, Narendra S. [3 ]
机构
[1] Vellore Inst Technol VIT AP Univ, Dept Comp Sci & Engn, Amaravati 522237, Andhra Pradesh, India
[2] Visvesvaraya Natl Inst Technol, Dept Comp Sci & Engn, Nagpur 440010, Maharashtra, India
[3] IIT, Dept Comp Sci & Engn, Indore 453552, Madhya Pradesh, India
关键词
LTE; LTE-A; Authentication; IoT; Privacy preservation; AVISPA; KFS; KBS; LTE; SERVICE; INTERNET; ISSUES; TOOL;
D O I
10.1007/s12083-019-00785-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the mobile telecommunication network, Long term Evolution (LTE) is the most successful technological development for the industrial services and applications. The Evolved Packet System based Authentication and Key Agreement (EPS-AKA) was the first protocol proposed to authenticate the communication entities in the LTE network. But, the EPS-AKA protocol suffers from the single key exposure problem and is susceptible to various security attacks. Also, the protocol incurs high bandwidth consumption and computation overhead over the communication network. Moreover, the protocol doesn't support the Internet of Things (IoT) based applications and has several security issues such as the privacy violation of the user identity and key set identifier (KSI). To resolve the above problems, various AKA protocols were proposed by the researchers. Unfortunately, none of the protocols succeeded to overcome the privacy preservation and single key exposure problem from the communication network. In this paper, we propose the performance and security enhanced (PSE-AKA) protocol for IoT enabled LTE/LTE-A network. The proposed protocol follows the cocktail therapy to generate the authentication vectors that improves the performance in terms of computation and communication overhead. The protocol preserves the privacy of objects, protects the KSI and avoids the identified attacks from the communication network. The formal verification and security analysis of the proposed protocol is carried out using the BAN logic and AVISPA tool respectively. The security analysis shows that the protocol achieves the security goals and secure against various known attacks. Finally, the performance analysis shows that the proposed protocol generates the less overhead and reduces the bandwidth consumption from the network.
引用
收藏
页码:1156 / 1177
页数:22
相关论文
共 42 条
  • [31] A Lightweight Authentication and Key Agreement Protocol for IoT-Enabled Smart Grid System
    Chen, Chen
    Guo, Hua
    Wu, Yapeng
    Shen, Bowen
    Ding, Mingyang
    Liu, Jianwei
    [J]. SENSORS, 2023, 23 (08)
  • [32] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huang, Huihui
    Lu, Siqi
    Wu, Zehui
    Wei, Qiang
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [33] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    [J]. IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [34] Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture
    Wu, Tsu-Yang
    Kong, Fangfang
    Meng, Qian
    Kumari, Saru
    Chen, Chien-Ming
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)
  • [35] A security enhanced authentication and key distribution protocol for wireless networks
    Lv, Chao
    Ma, Maode
    Li, Hui
    Ma, Jianfeng
    Niu, Ben
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (04) : 343 - 352
  • [36] Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks
    Fu, Anmin
    Qin, Ningyuan
    Wang, Yongli
    Li, Qianmu
    Zhang, Gongxuan
    [J]. WIRELESS NETWORKS, 2017, 23 (07) : 2165 - 2176
  • [37] Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks
    Anmin Fu
    Ningyuan Qin
    Yongli Wang
    Qianmu Li
    Gongxuan Zhang
    [J]. Wireless Networks, 2017, 23 : 2165 - 2176
  • [38] Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key
    Ghani, Anwar
    Mansoor, Khwaja
    Mehmood, Shahid
    Chaudhry, Shehzad Ashraf
    Rahman, Arif Ur
    Saqib, Malik Najmus
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (16)
  • [39] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huihui Huang
    Siqi Lu
    Zehui Wu
    Qiang Wei
    [J]. EURASIP Journal on Wireless Communications and Networking, 2021
  • [40] An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
    Tyagi, Pooja
    Kumari, Saru
    Alzahrani, Bander A.
    Gupta, Anshay
    Yang, Ming-Hour
    [J]. SENSORS, 2022, 22 (22)