Secure & efficient intra-MME handovers via mobile relays within the LTE-A and future 5G high-speed train networks

Nowadays, train networks are the most salient transportation mediums which demand higher data rates and reliable communication services for the onboard user equipments (UEs) over their long travels. The major issue associated with the high-speed train networks is that the frequent Long Term Evolution Advanced (LTE-A) Intra-MME handovers between the base stations generate high signaling overheads within the core network. Moreover, these LTE-A Intra-MME handovers are vulnerable to the desynchronization attack and cannot achieve forward key separation over the handovers. Therefore, the Intra-MME handovers cannot ensure access stratum (AS) secrecy. To improve the quality of services within the high-speed networks, recently, mobile relay nodes (MRNs) are incorporated into the LTE-A enabled high-speed vehicular networks. While the practice of these third-party MRNs may pose new security challenges. This research enlightens the loopholes which exist within the LTE-A Intra-MME handover protocol and proposes a more secure and efficient hierarchical grouping based Intra-MME handover protocol which is more suitable for the high-speed train networks. The proposed protocol promises to measure the minimum number of objects (base stations) over the measurement execution phase, optimizes the signaling overheads and reduces the handover processing time (handover interrupt time). Furthermore, to maintain the access stratum (AS) secrecy, the proposed protocol ensures secure handover session key establishment between the onboard UEs and the TDeNB. To demonstrate the effectiveness and efficiency of the proposed protocol, its performance is evaluated mathematically and security validations are carried out by various extensive simulations on Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and BAN logic.

[1]  Jin Cao,et al.  G2RHA:Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks , 2017, IEEE Transactions on Vehicular Technology.

[2]  Xuemin Shen,et al.  SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[3]  Qinglei Kong,et al.  Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks , 2017, IEEE Internet of Things Journal.

[4]  Antti Huima,et al.  Using multimodal logic to express conflicting interests in security protocols in proceedings of DIMACS Workshop on Design and formal verification of security protocols , 1997 .

[5]  Hwangnam Kim,et al.  Future of IoT Networks: A Survey , 2017 .

[6]  Jin Cao,et al.  A simple and robust handover authentication between HeNB and eNB in LTE networks , 2012, Comput. Networks.

[7]  Garima Singh,et al.  A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks , 2018, Sādhanā.

[8]  Neetesh Saxena,et al.  Authentication Protocol for an IoT-Enabled LTE Network , 2016, ACM Trans. Internet Techn..

[9]  Wen-Tsuen Chen,et al.  An Enhanced Handover Scheme for Mobile Relays in LTE-A High-Speed Rail Networks , 2015, IEEE Transactions on Vehicular Technology.

[10]  Gundeep Tanwar,et al.  Monitoring ambient light conditions of a school using IoT , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[11]  Hao Zhang,et al.  Performance analysis of IAF relaying mobile D2D cooperative networks , 2017, J. Frankl. Inst..

[12]  Yun Liu,et al.  Outage Performance for IDF Relaying Mobile Cooperative Networks , 2017, 5GWN.

[13]  Narendra S. Chaudhari,et al.  Re-encrypting secure and efficient routing in VANET groups using sharable clouds , 2018, 2018 4th International Conference on Recent Advances in Information Technology (RAIT).

[14]  Cheng Tao,et al.  Mobile Relay Based Fast Handover Scheme in High-Speed Mobile Environment , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).

[15]  Garima Singh,et al.  Security analysis of LTE/SAE networks with the possibilities of tampering E-Utran on NS3 , 2017, 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[16]  Bo Huang,et al.  A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks , 2012, IEEE Communications Letters.

[17]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[18]  Hyoung-Kee Choi,et al.  Security Analysis of Handover Key Management in 4G LTE/SAE Networks , 2014, IEEE Transactions on Mobile Computing.

[19]  Jin Cao,et al.  UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[20]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[21]  Deepti D. Shrimankar,et al.  Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks , 2018, Wirel. Pers. Commun..

[22]  Narendra S. Chaudhari,et al.  SAPSC: SignRecrypting authentication protocol using shareable clouds in VANET groups , 2019, IET Intelligent Transport Systems.

[23]  Maode Ma,et al.  Secure Group Mobility Support for 6LoWPAN Networks , 2018, IEEE Internet of Things Journal.

[24]  Jin Cao,et al.  UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks , 2018, Secur. Commun. Networks.