Abstract
The machine-type communication (MTC) connects millions of the smart devices and provides a large number of applications through all of our lives. Every day, MTC is undergoing ubiquitous development and becoming a crucial application of the Internet of Things. To implement MTC in real-life, it is a big challenge to ensure the congestion control and security and privacy of the MTC devices (MTCDs) within the MTC network. When umpteen MTCDs concurrently try to access the network, each MTCD requires performing a distinct 3GPP specified access authentication procedure with the core network, that creates distressful signaling congestion over the MTC network. Taking into the consideration the aforementioned issues, in this research article, the authors suggest a dynamic group based access authentication and key agreement protocol for MTC called as EMTC-AKA protocol. The proposed protocol ensures strong mutual authentication between the MTC entities and identity protection of the MTCDs. Unlike, the other approaches, projected approach ensures confidentiality and integrity of the user/control plane data transmitted over the wireless interface and optimizes the need of group key update on each group membership update. We formally verified the suggested protocol on Automated Validation of the Internet Security Protocols and Applications (AVISPA) tool. The verification results and theoretical analysis of the protocol signify that the suggested approach is safe from the multiple malicious attacks and ensures less bandwidth consumption, signaling overhead, transmission cost and transmission delay over the MTC network.
Similar content being viewed by others
References
Zhang, Y., Chen, J., Hui, L., Cao, J., & Lai, C. (2014). Group-based authentication and key agreement for machine-type communication. International Journal of Grid and Utility Computing, 5(2), 19–21.
Hwang, R.-H., Huang, C.-F., Lin, H.-W., & Wu, J.-J. (2016). Uplink access control for machine-type communications in LTE-A networks. Personal and Ubiquitous Computing, 20(6), 81–862.
Jain, P., Hedman, P., & Zisimopoulos, H. (2012). Machine type communications in 3GPP systems. IEEE Communications Magazine, 50, 28–35.
3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, Service requirements for Machine-Type Communications (MTC), (Release 12). 3GPP TS 22.368 V12.0.0 (2012-09).
3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, System Improvements for Machine-Type Communications (Release 11). 3GPP TR 23.888 V1.4.0 (2011-08).
Pan, Q., Wen, X., Lu, Z., & Wu, H. (2016). Group controller-based authentication for machine type communication under LTE network. In 2nd international conference on mechanical, electronic and information technology engineering (ICMITE 2016) (pp. 223–226).
Lai, C., Li, H., Lu, R., Jiang R., & Shen, X. (2013). LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks. In Globecom 2013—communication and information system security symposium (pp. 832–837).
Huang, J.-L., Yeh, L.-Y., & Yu, H. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 60(1), 248–262.
Chin, W., Lin, Y., & Chen, H. (2016). A Framework of machine-to-machine authentication in smart grid: A two-layer approach. IEEE Communications Magazine, 54, 102–107.
(2016). Ericsson Report Mobility on the Pulse of the Networked Society (June).
Alavikia, Z., & Ghasemi, A. (2018). Overload control in the network domain of LTE/LTE-A based machine type communications. Wireless Networks, 24, 1–16.
3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, Security aspects of Machine-Type and other Mobile Data Applications Communications Enhancements, (Release 12). 3GPP TR 33.868 V0.11.0 (2012-11).
Zhang, W., Zhang, Y., Chen, J., & Li, H. (2013). End-to-end security scheme for machine type communication based on generic authentication architecture. Cluster Computing, 16, 861–871.
3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3GPP System Architecture Evolution (SAE), Security architecture (Release 8). 3GPP TS 33.401 V8.8.0 (2011-06).
3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3GPP System Architecture Evolution (SAE), Security architecture (Release 11). 3GPP TS 33.401 V11.5.0 (2012-09).
Degefa, F. B., Lee, D., Kim, J., Choi, Y., & Won, D. (2016). Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Computer Networks, 94, 145–163.
Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., & Seifert, J.-P. (2016). Practical attacks against privacy and availability in 4G/LTE mobile communication systems. In NDSS (February) (pp. 21–24).
Cao, J., Ma, M., Li, H., Zhang, Y., & Luo, Z. (2014). A survey on security aspects for LTE and LTE-A networks. IEEE Communications Surveys & Tutorials, 16(1), 283–302.
Han, C., & Choi, H. (2014). Security analysis of handover key management in 4G LTE/SAE. Networks, 13(2), 457–468.
Park, Y., & Park, T. (2008). A survey of security threats on 4G networks. In 2007 IEEE Globecom workshops.
Hamandi, K., Abdo, J.-B., Elhajj, I.-H., Kayssi, A., & Chehab, A. (2016). A privacy-enhanced computationally-efficient and comprehensive LTE-AKA. Computer Communications, 98, 20–30.
Jover, R.-P., Lackey, J., & Raghavan, A. (2014). Enhancing the security of LTE networks against jamming attacks. EURASIP Journal on Information Security, 2014(1), 7.
3rd Generation Partnership Project, Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRA), Relay architectures for E-UTRA (LTE-Advanced) (Release 9). 3GPP TR 36.806 V0.2.0 (2009-11).
Cao, J., Ma, M., & Li, H. (2015). GBAAM: Group-based access authentication for MTC in LTE networks. Security and Communication Networks, 8(17), 3282–3299.
Fu, A., Song, J., Li, S., Zhang, G., & Zhang, Y. (2016). A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks. Security and Communication Networks, 9(13), 2002–2014.
Choi, D., Choi, H.-K., & Lee, H. C.-S. (2015). A group-based security protocol for machine-type communications in LTE-advanced. Wireless Networks, 21(2), 405–419.
Lai, C., Li, H., Lu, R., & Sherman, X. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510.
Lai, C., Lu, R., Li, H., Zheng, D., & Shen, X.-S. (2015). Secure machine-type communications in LTE networks. Wireless Communications and Mobile Computing, 16(2), 1495–1509.
Jiang, R., Lai, C., Luo, J., Wang, X., & Wang, H. (2013). EAP-based group authentication and key agreement protocol for machine-type communications. International Journal of Distributed Sensor Networks, 9(11), 304601,14.
Lai, C., Li, H., Li, X., & Cao, J. (2013). A novel group access authentication and key agreement protocol for machine-type communication. Transactions on Emerging Telecommunications Technologies, 26(3), 414–431.
Fu, A., Zhang, G., Zhang, Y., & ZHU, Z. (2013). GHAP: An efficient group-based handover authentication mechanism for IEEE 802. Wireless Personal Communications, 70(4), 1793–1810.
Jung, K., Park, A., & Lee, S. (2010). Machine-type-communication (MTC) device grouping algorithm for congestion avoidance of MTC oriented LTE network. Communications in Computer and Information Science, 78, 167–178.
Lee, H., Kim, D., Chung, B., & Yoon, H. (2008). Adaptive hysteresis using mobility correlation for fast handover. IEEE Communications Letters, 12(2), 152–154.
3rd Generation Partnership Project, Technical Specification Group Service and System Aspects, Network Domain Security, Authentication Framework (Release 6). 3GPP TS 33.310 V1.10.0 (2004-02).
Moorthy, S., & Bhuvaneswaran, R. S. (2015). Cognitive group leader selection algorithm for wireless sensor networks. Research Journal of Applied Sciences, Engineering and Technology, 8(24), 2403–2407.
Shayeji, M. H. A., Al-Azmi, A. R., Al-Azmi, A. R., & Samrajesh, M. D. (2011). Analysis and enhancements of leader elections algorithms in mobile ad hoc networks. ACEEE International Journal on Network Security, 2(4), 19–24.
Akele, G., Redwan, H., & Kim, K. (2014). Virtual group leader election algorithm in distributed WSN. In IEEE ICUFN 2014 (pp. 143–148).
Mohammad, S., & Pari, A. (2013). An incentive-based leader selection mechanism for mobile ad-hoc networks (MANETs), IFIP Wireless Days (WD), Valencia.
Takkinen, L. (2006). Analysing security protocols with AVISPA. TKK T-110.7290 Research Seminar on Network Security.
Dolev, D. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208.
Crypto++. https://www.cryptopp.com/. Accessed 21 July 2017.
Acknowledgements
This work was supported by the Visvesvaraya National Institute of Technology Nagpur, funded by Department of Electronics and Information Technology (Deity) Ministry of Communication and Information Technology, Government of India.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, G., Shrimankar, D.D. Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks. Wireless Pers Commun 101, 829–856 (2018). https://doi.org/10.1007/s11277-018-5719-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-5719-0