Massive machine-type communication (mMTC) access with integrated authentication

We present a connection establishment protocol with integrated authentication, suited for Massive Machine-Type Communications (mMTC). The protocol is contention-based and its main feature is that a device contends with a unique signature that also enables the authentication of the device towards the network. The signatures are inspired by Bloom filters and are created based on the output of the MILENAGE authentication and encryption algorithm set, which is used in the authentication and security procedures in the LTE protocol family. We show that our method utilizes the system resources more efficiently, achieves lower latency of connection establishment for Poisson arrivals and allows a 87% signalling overhead reduction. An important conclusion is that the mMTC traffic benefits profoundly from integration of security features into the connection establishment/access protocols, instead of addressing them post-hoc, which has been a common practice.

[1]  David C. Chu,et al.  Polyphase codes with good periodic correlation properties (Corresp.) , 1972, IEEE Trans. Inf. Theory.

[2]  Petar Popovski,et al.  Assessment of LTE Wireless Access for Monitoring of Energy Distribution in the Smart Grid , 2015, IEEE Journal on Selected Areas in Communications.

[3]  Petar Popovski,et al.  Random Access for Machine-Type Communication Based on Bloom Filtering , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[4]  Carsten Bockelmann,et al.  Massive machine-type communications in 5g: physical and MAC-layer solutions , 2016, IEEE Communications Magazine.

[5]  Valtteri Niemi,et al.  Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.

[6]  Kae Won Choi,et al.  Hybrid Random Access and Data Transmission Protocol for Machine-to-Machine Communications in Cellular Networks , 2015, IEEE Transactions on Wireless Communications.

[7]  Christopher Thompson,et al.  Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android , 2013, WOOT.

[8]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[9]  Petar Popovski,et al.  Massive M2M access with reliability guarantees in LTE systems , 2015, 2015 IEEE International Conference on Communications (ICC).

[10]  Petar Popovski,et al.  Code‐expanded radio access protocol for machine‐to‐machine communications , 2013, Trans. Emerg. Telecommun. Technol..

[11]  Valtteri Niemi,et al.  Cellular Authentication for Mobile and Internet Services , 2008 .

[12]  Sasu Tarkoma,et al.  Theory and Practice of Bloom Filters for Distributed Systems , 2012, IEEE Communications Surveys & Tutorials.