Skip to main content
Log in

Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The machine-type communication (MTC) connects millions of the smart devices and provides a large number of applications through all of our lives. Every day, MTC is undergoing ubiquitous development and becoming a crucial application of the Internet of Things. To implement MTC in real-life, it is a big challenge to ensure the congestion control and security and privacy of the MTC devices (MTCDs) within the MTC network. When umpteen MTCDs concurrently try to access the network, each MTCD requires performing a distinct 3GPP specified access authentication procedure with the core network, that creates distressful signaling congestion over the MTC network. Taking into the consideration the aforementioned issues, in this research article, the authors suggest a dynamic group based access authentication and key agreement protocol for MTC called as EMTC-AKA protocol. The proposed protocol ensures strong mutual authentication between the MTC entities and identity protection of the MTCDs. Unlike, the other approaches, projected approach ensures confidentiality and integrity of the user/control plane data transmitted over the wireless interface and optimizes the need of group key update on each group membership update. We formally verified the suggested protocol on Automated Validation of the Internet Security Protocols and Applications (AVISPA) tool. The verification results and theoretical analysis of the protocol signify that the suggested approach is safe from the multiple malicious attacks and ensures less bandwidth consumption, signaling overhead, transmission cost and transmission delay over the MTC network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Zhang, Y., Chen, J., Hui, L., Cao, J., & Lai, C. (2014). Group-based authentication and key agreement for machine-type communication. International Journal of Grid and Utility Computing, 5(2), 19–21.

    Article  Google Scholar 

  2. Hwang, R.-H., Huang, C.-F., Lin, H.-W., & Wu, J.-J. (2016). Uplink access control for machine-type communications in LTE-A networks. Personal and Ubiquitous Computing, 20(6), 81–862.

    Article  Google Scholar 

  3. Jain, P., Hedman, P., & Zisimopoulos, H. (2012). Machine type communications in 3GPP systems. IEEE Communications Magazine, 50, 28–35.

    Article  Google Scholar 

  4. 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, Service requirements for Machine-Type Communications (MTC), (Release 12). 3GPP TS 22.368 V12.0.0 (2012-09).

  5. 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, System Improvements for Machine-Type Communications (Release 11). 3GPP TR 23.888 V1.4.0 (2011-08).

  6. Pan, Q., Wen, X., Lu, Z., & Wu, H. (2016). Group controller-based authentication for machine type communication under LTE network. In 2nd international conference on mechanical, electronic and information technology engineering (ICMITE 2016) (pp. 223–226).

  7. Lai, C., Li, H., Lu, R., Jiang R., & Shen, X. (2013). LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks. In Globecom 2013—communication and information system security symposium (pp. 832–837).

  8. Huang, J.-L., Yeh, L.-Y., & Yu, H. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 60(1), 248–262.

    Article  Google Scholar 

  9. Chin, W., Lin, Y., & Chen, H. (2016). A Framework of machine-to-machine authentication in smart grid: A two-layer approach. IEEE Communications Magazine, 54, 102–107.

    Article  Google Scholar 

  10. (2016). Ericsson Report Mobility on the Pulse of the Networked Society (June).

  11. Alavikia, Z., & Ghasemi, A. (2018). Overload control in the network domain of LTE/LTE-A based machine type communications. Wireless Networks, 24, 1–16.

    Article  Google Scholar 

  12. 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, Security aspects of Machine-Type and other Mobile Data Applications Communications Enhancements, (Release 12). 3GPP TR 33.868 V0.11.0 (2012-11).

  13. Zhang, W., Zhang, Y., Chen, J., & Li, H. (2013). End-to-end security scheme for machine type communication based on generic authentication architecture. Cluster Computing, 16, 861–871.

    Article  Google Scholar 

  14. 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3GPP System Architecture Evolution (SAE), Security architecture (Release 8). 3GPP TS 33.401 V8.8.0 (2011-06).

  15. 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3GPP System Architecture Evolution (SAE), Security architecture (Release 11). 3GPP TS 33.401 V11.5.0 (2012-09).

  16. Degefa, F. B., Lee, D., Kim, J., Choi, Y., & Won, D. (2016). Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Computer Networks, 94, 145–163.

    Article  Google Scholar 

  17. Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., & Seifert, J.-P. (2016). Practical attacks against privacy and availability in 4G/LTE mobile communication systems. In NDSS (February) (pp. 21–24).

  18. Cao, J., Ma, M., Li, H., Zhang, Y., & Luo, Z. (2014). A survey on security aspects for LTE and LTE-A networks. IEEE Communications Surveys & Tutorials, 16(1), 283–302.

    Article  Google Scholar 

  19. Han, C., & Choi, H. (2014). Security analysis of handover key management in 4G LTE/SAE. Networks, 13(2), 457–468.

    Google Scholar 

  20. Park, Y., & Park, T. (2008). A survey of security threats on 4G networks. In 2007 IEEE Globecom workshops.

  21. Hamandi, K., Abdo, J.-B., Elhajj, I.-H., Kayssi, A., & Chehab, A. (2016). A privacy-enhanced computationally-efficient and comprehensive LTE-AKA. Computer Communications, 98, 20–30.

    Article  Google Scholar 

  22. Jover, R.-P., Lackey, J., & Raghavan, A. (2014). Enhancing the security of LTE networks against jamming attacks. EURASIP Journal on Information Security, 2014(1), 7.

    Article  Google Scholar 

  23. 3rd Generation Partnership Project, Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRA), Relay architectures for E-UTRA (LTE-Advanced) (Release 9). 3GPP TR 36.806 V0.2.0 (2009-11).

  24. Cao, J., Ma, M., & Li, H. (2015). GBAAM: Group-based access authentication for MTC in LTE networks. Security and Communication Networks, 8(17), 3282–3299.

    Article  Google Scholar 

  25. Fu, A., Song, J., Li, S., Zhang, G., & Zhang, Y. (2016). A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks. Security and Communication Networks, 9(13), 2002–2014.

    Google Scholar 

  26. Choi, D., Choi, H.-K., & Lee, H. C.-S. (2015). A group-based security protocol for machine-type communications in LTE-advanced. Wireless Networks, 21(2), 405–419.

    Article  Google Scholar 

  27. Lai, C., Li, H., Lu, R., & Sherman, X. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510.

    Article  Google Scholar 

  28. Lai, C., Lu, R., Li, H., Zheng, D., & Shen, X.-S. (2015). Secure machine-type communications in LTE networks. Wireless Communications and Mobile Computing, 16(2), 1495–1509.

    Google Scholar 

  29. Jiang, R., Lai, C., Luo, J., Wang, X., & Wang, H. (2013). EAP-based group authentication and key agreement protocol for machine-type communications. International Journal of Distributed Sensor Networks, 9(11), 304601,14.

    Google Scholar 

  30. Lai, C., Li, H., Li, X., & Cao, J. (2013). A novel group access authentication and key agreement protocol for machine-type communication. Transactions on Emerging Telecommunications Technologies, 26(3), 414–431.

    Article  Google Scholar 

  31. Fu, A., Zhang, G., Zhang, Y., & ZHU, Z. (2013). GHAP: An efficient group-based handover authentication mechanism for IEEE 802. Wireless Personal Communications, 70(4), 1793–1810.

    Article  Google Scholar 

  32. Jung, K., Park, A., & Lee, S. (2010). Machine-type-communication (MTC) device grouping algorithm for congestion avoidance of MTC oriented LTE network. Communications in Computer and Information Science, 78, 167–178.

    Article  Google Scholar 

  33. Lee, H., Kim, D., Chung, B., & Yoon, H. (2008). Adaptive hysteresis using mobility correlation for fast handover. IEEE Communications Letters, 12(2), 152–154.

    Article  Google Scholar 

  34. 3rd Generation Partnership Project, Technical Specification Group Service and System Aspects, Network Domain Security, Authentication Framework (Release 6). 3GPP TS 33.310 V1.10.0 (2004-02).

  35. Moorthy, S., & Bhuvaneswaran, R. S. (2015). Cognitive group leader selection algorithm for wireless sensor networks. Research Journal of Applied Sciences, Engineering and Technology, 8(24), 2403–2407.

    Article  Google Scholar 

  36. Shayeji, M. H. A., Al-Azmi, A. R., Al-Azmi, A. R., & Samrajesh, M. D. (2011). Analysis and enhancements of leader elections algorithms in mobile ad hoc networks. ACEEE International Journal on Network Security, 2(4), 19–24.

    Google Scholar 

  37. Akele, G., Redwan, H., & Kim, K. (2014). Virtual group leader election algorithm in distributed WSN. In IEEE ICUFN 2014 (pp. 143–148).

  38. Mohammad, S., & Pari, A. (2013). An incentive-based leader selection mechanism for mobile ad-hoc networks (MANETs), IFIP Wireless Days (WD), Valencia.

  39. Takkinen, L. (2006). Analysing security protocols with AVISPA. TKK T-110.7290 Research Seminar on Network Security.

  40. Dolev, D. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208.

    Article  MathSciNet  MATH  Google Scholar 

  41. Crypto++. https://www.cryptopp.com/. Accessed 21 July 2017.

Download references

Acknowledgements

This work was supported by the Visvesvaraya National Institute of Technology Nagpur, funded by Department of Electronics and Information Technology (Deity) Ministry of Communication and Information Technology, Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Garima Singh.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, G., Shrimankar, D.D. Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks. Wireless Pers Commun 101, 829–856 (2018). https://doi.org/10.1007/s11277-018-5719-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5719-0

Keywords

Navigation