Skip to main content
Erschienen in: Wireless Personal Communications 2/2018

13.04.2018

Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks

verfasst von: Garima Singh, Deepti D. Shrimankar

Erschienen in: Wireless Personal Communications | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The machine-type communication (MTC) connects millions of the smart devices and provides a large number of applications through all of our lives. Every day, MTC is undergoing ubiquitous development and becoming a crucial application of the Internet of Things. To implement MTC in real-life, it is a big challenge to ensure the congestion control and security and privacy of the MTC devices (MTCDs) within the MTC network. When umpteen MTCDs concurrently try to access the network, each MTCD requires performing a distinct 3GPP specified access authentication procedure with the core network, that creates distressful signaling congestion over the MTC network. Taking into the consideration the aforementioned issues, in this research article, the authors suggest a dynamic group based access authentication and key agreement protocol for MTC called as EMTC-AKA protocol. The proposed protocol ensures strong mutual authentication between the MTC entities and identity protection of the MTCDs. Unlike, the other approaches, projected approach ensures confidentiality and integrity of the user/control plane data transmitted over the wireless interface and optimizes the need of group key update on each group membership update. We formally verified the suggested protocol on Automated Validation of the Internet Security Protocols and Applications (AVISPA) tool. The verification results and theoretical analysis of the protocol signify that the suggested approach is safe from the multiple malicious attacks and ensures less bandwidth consumption, signaling overhead, transmission cost and transmission delay over the MTC network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang, Y., Chen, J., Hui, L., Cao, J., & Lai, C. (2014). Group-based authentication and key agreement for machine-type communication. International Journal of Grid and Utility Computing, 5(2), 19–21.CrossRef Zhang, Y., Chen, J., Hui, L., Cao, J., & Lai, C. (2014). Group-based authentication and key agreement for machine-type communication. International Journal of Grid and Utility Computing, 5(2), 19–21.CrossRef
2.
Zurück zum Zitat Hwang, R.-H., Huang, C.-F., Lin, H.-W., & Wu, J.-J. (2016). Uplink access control for machine-type communications in LTE-A networks. Personal and Ubiquitous Computing, 20(6), 81–862.CrossRef Hwang, R.-H., Huang, C.-F., Lin, H.-W., & Wu, J.-J. (2016). Uplink access control for machine-type communications in LTE-A networks. Personal and Ubiquitous Computing, 20(6), 81–862.CrossRef
3.
Zurück zum Zitat Jain, P., Hedman, P., & Zisimopoulos, H. (2012). Machine type communications in 3GPP systems. IEEE Communications Magazine, 50, 28–35.CrossRef Jain, P., Hedman, P., & Zisimopoulos, H. (2012). Machine type communications in 3GPP systems. IEEE Communications Magazine, 50, 28–35.CrossRef
4.
Zurück zum Zitat 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, Service requirements for Machine-Type Communications (MTC), (Release 12). 3GPP TS 22.368 V12.0.0 (2012-09). 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, Service requirements for Machine-Type Communications (MTC), (Release 12). 3GPP TS 22.368 V12.0.0 (2012-09).
5.
Zurück zum Zitat 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, System Improvements for Machine-Type Communications (Release 11). 3GPP TR 23.888 V1.4.0 (2011-08). 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, System Improvements for Machine-Type Communications (Release 11). 3GPP TR 23.888 V1.4.0 (2011-08).
6.
Zurück zum Zitat Pan, Q., Wen, X., Lu, Z., & Wu, H. (2016). Group controller-based authentication for machine type communication under LTE network. In 2nd international conference on mechanical, electronic and information technology engineering (ICMITE 2016) (pp. 223–226). Pan, Q., Wen, X., Lu, Z., & Wu, H. (2016). Group controller-based authentication for machine type communication under LTE network. In 2nd international conference on mechanical, electronic and information technology engineering (ICMITE 2016) (pp. 223–226).
7.
Zurück zum Zitat Lai, C., Li, H., Lu, R., Jiang R., & Shen, X. (2013). LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks. In Globecom 2013—communication and information system security symposium (pp. 832–837). Lai, C., Li, H., Lu, R., Jiang R., & Shen, X. (2013). LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks. In Globecom 2013—communication and information system security symposium (pp. 832–837).
8.
Zurück zum Zitat Huang, J.-L., Yeh, L.-Y., & Yu, H. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 60(1), 248–262.CrossRef Huang, J.-L., Yeh, L.-Y., & Yu, H. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 60(1), 248–262.CrossRef
9.
Zurück zum Zitat Chin, W., Lin, Y., & Chen, H. (2016). A Framework of machine-to-machine authentication in smart grid: A two-layer approach. IEEE Communications Magazine, 54, 102–107.CrossRef Chin, W., Lin, Y., & Chen, H. (2016). A Framework of machine-to-machine authentication in smart grid: A two-layer approach. IEEE Communications Magazine, 54, 102–107.CrossRef
10.
Zurück zum Zitat (2016). Ericsson Report Mobility on the Pulse of the Networked Society (June). (2016). Ericsson Report Mobility on the Pulse of the Networked Society (June).
11.
Zurück zum Zitat Alavikia, Z., & Ghasemi, A. (2018). Overload control in the network domain of LTE/LTE-A based machine type communications. Wireless Networks, 24, 1–16.CrossRef Alavikia, Z., & Ghasemi, A. (2018). Overload control in the network domain of LTE/LTE-A based machine type communications. Wireless Networks, 24, 1–16.CrossRef
12.
Zurück zum Zitat 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, Security aspects of Machine-Type and other Mobile Data Applications Communications Enhancements, (Release 12). 3GPP TR 33.868 V0.11.0 (2012-11). 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, Security aspects of Machine-Type and other Mobile Data Applications Communications Enhancements, (Release 12). 3GPP TR 33.868 V0.11.0 (2012-11).
13.
Zurück zum Zitat Zhang, W., Zhang, Y., Chen, J., & Li, H. (2013). End-to-end security scheme for machine type communication based on generic authentication architecture. Cluster Computing, 16, 861–871.CrossRef Zhang, W., Zhang, Y., Chen, J., & Li, H. (2013). End-to-end security scheme for machine type communication based on generic authentication architecture. Cluster Computing, 16, 861–871.CrossRef
14.
Zurück zum Zitat 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3GPP System Architecture Evolution (SAE), Security architecture (Release 8). 3GPP TS 33.401 V8.8.0 (2011-06). 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3GPP System Architecture Evolution (SAE), Security architecture (Release 8). 3GPP TS 33.401 V8.8.0 (2011-06).
15.
Zurück zum Zitat 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3GPP System Architecture Evolution (SAE), Security architecture (Release 11). 3GPP TS 33.401 V11.5.0 (2012-09). 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3GPP System Architecture Evolution (SAE), Security architecture (Release 11). 3GPP TS 33.401 V11.5.0 (2012-09).
16.
Zurück zum Zitat Degefa, F. B., Lee, D., Kim, J., Choi, Y., & Won, D. (2016). Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Computer Networks, 94, 145–163.CrossRef Degefa, F. B., Lee, D., Kim, J., Choi, Y., & Won, D. (2016). Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Computer Networks, 94, 145–163.CrossRef
17.
Zurück zum Zitat Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., & Seifert, J.-P. (2016). Practical attacks against privacy and availability in 4G/LTE mobile communication systems. In NDSS (February) (pp. 21–24). Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., & Seifert, J.-P. (2016). Practical attacks against privacy and availability in 4G/LTE mobile communication systems. In NDSS (February) (pp. 21–24).
18.
Zurück zum Zitat Cao, J., Ma, M., Li, H., Zhang, Y., & Luo, Z. (2014). A survey on security aspects for LTE and LTE-A networks. IEEE Communications Surveys & Tutorials, 16(1), 283–302.CrossRef Cao, J., Ma, M., Li, H., Zhang, Y., & Luo, Z. (2014). A survey on security aspects for LTE and LTE-A networks. IEEE Communications Surveys & Tutorials, 16(1), 283–302.CrossRef
19.
Zurück zum Zitat Han, C., & Choi, H. (2014). Security analysis of handover key management in 4G LTE/SAE. Networks, 13(2), 457–468. Han, C., & Choi, H. (2014). Security analysis of handover key management in 4G LTE/SAE. Networks, 13(2), 457–468.
20.
Zurück zum Zitat Park, Y., & Park, T. (2008). A survey of security threats on 4G networks. In 2007 IEEE Globecom workshops. Park, Y., & Park, T. (2008). A survey of security threats on 4G networks. In 2007 IEEE Globecom workshops.
21.
Zurück zum Zitat Hamandi, K., Abdo, J.-B., Elhajj, I.-H., Kayssi, A., & Chehab, A. (2016). A privacy-enhanced computationally-efficient and comprehensive LTE-AKA. Computer Communications, 98, 20–30.CrossRef Hamandi, K., Abdo, J.-B., Elhajj, I.-H., Kayssi, A., & Chehab, A. (2016). A privacy-enhanced computationally-efficient and comprehensive LTE-AKA. Computer Communications, 98, 20–30.CrossRef
22.
Zurück zum Zitat Jover, R.-P., Lackey, J., & Raghavan, A. (2014). Enhancing the security of LTE networks against jamming attacks. EURASIP Journal on Information Security, 2014(1), 7.CrossRef Jover, R.-P., Lackey, J., & Raghavan, A. (2014). Enhancing the security of LTE networks against jamming attacks. EURASIP Journal on Information Security, 2014(1), 7.CrossRef
23.
Zurück zum Zitat 3rd Generation Partnership Project, Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRA), Relay architectures for E-UTRA (LTE-Advanced) (Release 9). 3GPP TR 36.806 V0.2.0 (2009-11). 3rd Generation Partnership Project, Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRA), Relay architectures for E-UTRA (LTE-Advanced) (Release 9). 3GPP TR 36.806 V0.2.0 (2009-11).
24.
Zurück zum Zitat Cao, J., Ma, M., & Li, H. (2015). GBAAM: Group-based access authentication for MTC in LTE networks. Security and Communication Networks, 8(17), 3282–3299.CrossRef Cao, J., Ma, M., & Li, H. (2015). GBAAM: Group-based access authentication for MTC in LTE networks. Security and Communication Networks, 8(17), 3282–3299.CrossRef
25.
Zurück zum Zitat Fu, A., Song, J., Li, S., Zhang, G., & Zhang, Y. (2016). A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks. Security and Communication Networks, 9(13), 2002–2014. Fu, A., Song, J., Li, S., Zhang, G., & Zhang, Y. (2016). A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks. Security and Communication Networks, 9(13), 2002–2014.
26.
Zurück zum Zitat Choi, D., Choi, H.-K., & Lee, H. C.-S. (2015). A group-based security protocol for machine-type communications in LTE-advanced. Wireless Networks, 21(2), 405–419.CrossRef Choi, D., Choi, H.-K., & Lee, H. C.-S. (2015). A group-based security protocol for machine-type communications in LTE-advanced. Wireless Networks, 21(2), 405–419.CrossRef
27.
Zurück zum Zitat Lai, C., Li, H., Lu, R., & Sherman, X. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510.CrossRef Lai, C., Li, H., Lu, R., & Sherman, X. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510.CrossRef
28.
Zurück zum Zitat Lai, C., Lu, R., Li, H., Zheng, D., & Shen, X.-S. (2015). Secure machine-type communications in LTE networks. Wireless Communications and Mobile Computing, 16(2), 1495–1509. Lai, C., Lu, R., Li, H., Zheng, D., & Shen, X.-S. (2015). Secure machine-type communications in LTE networks. Wireless Communications and Mobile Computing, 16(2), 1495–1509.
29.
Zurück zum Zitat Jiang, R., Lai, C., Luo, J., Wang, X., & Wang, H. (2013). EAP-based group authentication and key agreement protocol for machine-type communications. International Journal of Distributed Sensor Networks, 9(11), 304601,14. Jiang, R., Lai, C., Luo, J., Wang, X., & Wang, H. (2013). EAP-based group authentication and key agreement protocol for machine-type communications. International Journal of Distributed Sensor Networks, 9(11), 304601,14.
30.
Zurück zum Zitat Lai, C., Li, H., Li, X., & Cao, J. (2013). A novel group access authentication and key agreement protocol for machine-type communication. Transactions on Emerging Telecommunications Technologies, 26(3), 414–431.CrossRef Lai, C., Li, H., Li, X., & Cao, J. (2013). A novel group access authentication and key agreement protocol for machine-type communication. Transactions on Emerging Telecommunications Technologies, 26(3), 414–431.CrossRef
31.
Zurück zum Zitat Fu, A., Zhang, G., Zhang, Y., & ZHU, Z. (2013). GHAP: An efficient group-based handover authentication mechanism for IEEE 802. Wireless Personal Communications, 70(4), 1793–1810.CrossRef Fu, A., Zhang, G., Zhang, Y., & ZHU, Z. (2013). GHAP: An efficient group-based handover authentication mechanism for IEEE 802. Wireless Personal Communications, 70(4), 1793–1810.CrossRef
32.
Zurück zum Zitat Jung, K., Park, A., & Lee, S. (2010). Machine-type-communication (MTC) device grouping algorithm for congestion avoidance of MTC oriented LTE network. Communications in Computer and Information Science, 78, 167–178.CrossRef Jung, K., Park, A., & Lee, S. (2010). Machine-type-communication (MTC) device grouping algorithm for congestion avoidance of MTC oriented LTE network. Communications in Computer and Information Science, 78, 167–178.CrossRef
33.
Zurück zum Zitat Lee, H., Kim, D., Chung, B., & Yoon, H. (2008). Adaptive hysteresis using mobility correlation for fast handover. IEEE Communications Letters, 12(2), 152–154.CrossRef Lee, H., Kim, D., Chung, B., & Yoon, H. (2008). Adaptive hysteresis using mobility correlation for fast handover. IEEE Communications Letters, 12(2), 152–154.CrossRef
34.
Zurück zum Zitat 3rd Generation Partnership Project, Technical Specification Group Service and System Aspects, Network Domain Security, Authentication Framework (Release 6). 3GPP TS 33.310 V1.10.0 (2004-02). 3rd Generation Partnership Project, Technical Specification Group Service and System Aspects, Network Domain Security, Authentication Framework (Release 6). 3GPP TS 33.310 V1.10.0 (2004-02).
35.
Zurück zum Zitat Moorthy, S., & Bhuvaneswaran, R. S. (2015). Cognitive group leader selection algorithm for wireless sensor networks. Research Journal of Applied Sciences, Engineering and Technology, 8(24), 2403–2407.CrossRef Moorthy, S., & Bhuvaneswaran, R. S. (2015). Cognitive group leader selection algorithm for wireless sensor networks. Research Journal of Applied Sciences, Engineering and Technology, 8(24), 2403–2407.CrossRef
36.
Zurück zum Zitat Shayeji, M. H. A., Al-Azmi, A. R., Al-Azmi, A. R., & Samrajesh, M. D. (2011). Analysis and enhancements of leader elections algorithms in mobile ad hoc networks. ACEEE International Journal on Network Security, 2(4), 19–24. Shayeji, M. H. A., Al-Azmi, A. R., Al-Azmi, A. R., & Samrajesh, M. D. (2011). Analysis and enhancements of leader elections algorithms in mobile ad hoc networks. ACEEE International Journal on Network Security, 2(4), 19–24.
37.
Zurück zum Zitat Akele, G., Redwan, H., & Kim, K. (2014). Virtual group leader election algorithm in distributed WSN. In IEEE ICUFN 2014 (pp. 143–148). Akele, G., Redwan, H., & Kim, K. (2014). Virtual group leader election algorithm in distributed WSN. In IEEE ICUFN 2014 (pp. 143–148).
38.
Zurück zum Zitat Mohammad, S., & Pari, A. (2013). An incentive-based leader selection mechanism for mobile ad-hoc networks (MANETs), IFIP Wireless Days (WD), Valencia. Mohammad, S., & Pari, A. (2013). An incentive-based leader selection mechanism for mobile ad-hoc networks (MANETs), IFIP Wireless Days (WD), Valencia.
39.
Zurück zum Zitat Takkinen, L. (2006). Analysing security protocols with AVISPA. TKK T-110.7290 Research Seminar on Network Security. Takkinen, L. (2006). Analysing security protocols with AVISPA. TKK T-110.7290 Research Seminar on Network Security.
40.
Metadaten
Titel
Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks
verfasst von
Garima Singh
Deepti D. Shrimankar
Publikationsdatum
13.04.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5719-0

Weitere Artikel der Ausgabe 2/2018

Wireless Personal Communications 2/2018 Zur Ausgabe

Neuer Inhalt