PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks

In the mobile telecommunication network, Long term Evolution (LTE) is the most successful technological development for the industrial services and applications. The Evolved Packet System based Authentication and Key Agreement (EPS-AKA) was the first protocol proposed to authenticate the communication entities in the LTE network. But, the EPS-AKA protocol suffers from the single key exposure problem and is susceptible to various security attacks. Also, the protocol incurs high bandwidth consumption and computation overhead over the communication network. Moreover, the protocol doesn’t support the Internet of Things (IoT) based applications and has several security issues such as the privacy violation of the user identity and key set identifier (KSI). To resolve the above problems, various AKA protocols were proposed by the researchers. Unfortunately, none of the protocols succeeded to overcome the privacy preservation and single key exposure problem from the communication network. In this paper, we propose the performance and security enhanced (PSE-AKA) protocol for IoT enabled LTE/LTE-A network. The proposed protocol follows the cocktail therapy to generate the authentication vectors that improves the performance in terms of computation and communication overhead. The protocol preserves the privacy of objects, protects the KSI and avoids the identified attacks from the communication network. The formal verification and security analysis of the proposed protocol is carried out using the BAN logic and AVISPA tool respectively. The security analysis shows that the protocol achieves the security goals and secure against various known attacks. Finally, the performance analysis shows that the proposed protocol generates the less overhead and reduces the bandwidth consumption from the network.

[1]  Kyung-Yong Chung,et al.  Performance analysis of LTE downlink system using relay-based selective transmission , 2013, Personal and Ubiquitous Computing.

[2]  Mostafa M. Fouda,et al.  An efficient distributed approach for key management in microgrids , 2015, 2015 11th International Computer Engineering Conference (ICENCO).

[3]  Rohit Vaid,et al.  Analysis of Existing Protocols in WSN Based on Key Parameters , 2018, Proceedings of 2nd International Conference on Communication, Computing and Networking.

[4]  Ayman I. Kayssi,et al.  Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[5]  R. Manoharan,et al.  A Robust Secure DS-AKA with Mutual Authentication for LTE-A , 2015 .

[6]  Anurag Agarwal,et al.  The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.

[7]  Aboubaker Lasebae,et al.  Providing Security in 4G Systems: Unveiling the Challenges , 2010, 2010 Sixth Advanced International Conference on Telecommunications.

[8]  Woo-Sik Bae Designing and verifying a P2P service security protocol in M2M environment , 2016, Peer Peer Netw. Appl..

[9]  Vanga Odelu,et al.  A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Geir M. Køien Mutual entity authentication for LTE , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[11]  Rachid Elkouch,et al.  Security analysis of LTE/SAE networks over E-UTRAN , 2016, 2016 International Conference on Information Technology for Organizations Development (IT4OD).

[12]  Taejoon Park,et al.  A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.

[13]  Jaeho Kim,et al.  M2M Service Platforms: Survey, Issues, and Enabling Technologies , 2014, IEEE Communications Surveys & Tutorials.

[14]  Xuemin Shen,et al.  SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.

[15]  Gang Wang,et al.  Resource allocation for M2M-enabled cellular network using Nash bargaining game theory , 2018, Peer-to-Peer Netw. Appl..

[16]  Yucheng Zhang,et al.  A novel 3GPP SAE authentication and key agreement protocol , 2009, 2009 IEEE International Conference on Network Infrastructure and Digital Content.

[17]  Martín Abadi,et al.  Authentication: A Practical Study in Belief and Action , 1988, TARK.

[18]  Alessandro Neri,et al.  Security Protocols for IoT Access Networks , 2016 .

[19]  Jeffrey G. Andrews,et al.  An Overview on 3GPP Device-to-Device Proximity Services , 2013, 1310.0116.

[20]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[21]  Mohit Gupta,et al.  Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit , 2019, Ad Hoc Networks.

[22]  Hsiao-Hwa Chen,et al.  M2M Communications in 3GPP LTE/LTE-A Networks: Architectures, Service Requirements, Challenges, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[23]  Raed A. Abd-Alhameed,et al.  Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.

[24]  Victor Fajardo,et al.  Diameter Base Protocol , 2003, RFC.

[25]  Ayman I. Kayssi,et al.  A privacy-enhanced computationally-efficient and comprehensive LTE-AKA , 2017, Comput. Commun..

[26]  Min-Shiang Hwang,et al.  A cocktail protocol with the Authentication and Key Agreement on the UMTS , 2010, J. Syst. Softw..

[27]  Basav Roychoudhury,et al.  Enhancing User Identity Privacy in LTE , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[28]  Songwu Lu,et al.  Can we pay for what we get in 3G data access? , 2012, Mobicom '12.

[29]  Yongjun Wang,et al.  Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[30]  Donghoon Lee,et al.  Performance and security enhanced authentication and key agreement protocol for SAE/LTE network , 2016, Comput. Networks.

[31]  Mark A. Gregory,et al.  A green and secure authentication for the 4th generation mobile network , 2011, 2011 Australasian Telecommunication Networks and Applications Conference (ATNAC).

[32]  L. Kamoun,et al.  Authentication protocol in fourth generation wireless networks , 2009, 2009 IFIP International Conference on Wireless and Optical Communications Networks.

[33]  Minyi Guo,et al.  Optimizing power consumption of mobile devices for video streaming over 4G LTE networks , 2017, Peer-to-Peer Networking and Applications.

[34]  Fagen Li,et al.  User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System , 2016, Int. J. Netw. Secur..

[35]  Ion Bica,et al.  Security Analysis of LTE Access Network , 2011, ICON 2011.

[36]  Won-Gyu Lee,et al.  Development and application of internet of things educational tool based on peer to peer network , 2017, Peer-to-Peer Networking and Applications.

[37]  Ion Bica,et al.  A J-PAKE based solution for secure authentication in a 4G network , 2011 .

[38]  Neetesh Saxena,et al.  Authentication Protocol for an IoT-Enabled LTE Network , 2016, ACM Trans. Internet Techn..

[39]  Einar Snekkenes,et al.  On The Formal Analysis of PKCS Authentication Protocols , 1990, AUSCRYPT.

[40]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.

[41]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[42]  Jin Cao,et al.  A novel group access authentication and key agreement protocol for machine‐type communication , 2015, Trans. Emerg. Telecommun. Technol..

[43]  Xiaohu Tang,et al.  AKA and Authorization Scheme for 4G Mobile Networks Based on Trusted Mobile Platform , 2005, 2005 5th International Conference on Information Communications & Signal Processing.

[44]  Nicolas Sklavos,et al.  LTE/SAE Security Issues on 4G Wireless Networks , 2013, IEEE Security & Privacy.

[45]  Hong Wang,et al.  EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications , 2013, Int. J. Distributed Sens. Networks.

[46]  Jaeho Kim,et al.  Towards the oneM2M standards for building IoT ecosystem: Analysis, implementation and lessons , 2018, Peer Peer Netw. Appl..

[47]  Masoumeh Purkhiabani Enhanced Authentication and Key Agreement Procedureof Next Generation 3GPP Mobile Networks , 2012 .

[48]  Mohammad Hesam Tadayon,et al.  A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid , 2018, IEEE Transactions on Smart Grid.