Hierarchical Group Authentication and Key agreement for Machine Type Communication in LTE Networks

Authors

  • Srinivas Kalime, K. Sagar

Keywords:

Authentication, Key management, Lightweight Cryptography, IoT, WSN, Machine-type communications.

Abstract

The 3GPP LTE-A standard for Machine Type Communication (MTC) was created to facilitate communication between entities without human involvement, in response to the rapid increase in wireless data communication volume. The conventional Mutual Authentication and Key Agreement (AKA) mechanism in LTE networks is struggling due to the rising signaling load caused by the expanding device count. Group-based architecture has been proposed as a solution in the literature to solve authentication traffic, but it has its own problems.

In this paper, we propose a hierarchical group based mutual authentication and key agreement (HGMAKA) protocol to address these challenges. This protocol ensures privacy, prevents unauthorized access to information, and helps prevent many types of assaults such as replay attacks, distributed denial of service, and man-in-the-middle attacks. The proposed protocol enables MTC services to be supported by small cells with heterogeneous architecture that aligns with 5G networks. The Aggregate Message Authentication Code based approach is more lightweight, resource-efficient, robust against authentication message failures, and scalable to heterogeneous network topologies compared to earlier protocols. We experimented our proposed system and the results demonstrated increased efficiency, resolved existing difficulties, and will enhance the reliability and security of the M2M system.

Downloads

Download data is not yet available.

References

C. Lai, H. Li, R. Lu, R. Jiang, and X. Shen, “LGTH: a lightweight group authentication protocol for machine-type communication in LTE networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM ’13), pp. 832–837, December 2013.

D. Choi, S. Hong, and H.-K. Choi, “A group-based security protocol for machine type communications in LTE-advanced,” in Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS ’14), pp. 161–162, IEEE, Ontario, Canada, May 2014.

C. Lai, R. Lu, D. Zheng, H. Li, and X. Sherman, “GLARM: group-based lightweight authentication scheme for resource constrained machine to machine communications,” Computer Networks, vol. 99, pp. 66–81, 2016.

Balu L. Parne; Shubham Gupta; Narendra S. Chaudhari, SEGB: Security enhanced group-based AKA Protocol for M2M communication in an LTE Network, IEEE 2019.

F. Haider, C.-X. Wang, H. Haas et al., “Spectral efficiency analysis of mobile Femtocell based cellular systems,” in Proceedings of the IEEE 13th International Conference on Communication Technology (ICCT’11), pp. 347–351, IEEE, Jinan, China, September 2011.

A Scheme of Group-based AKA for Machine Type Communication over LTE Networks, GR-AKA. Mariya Ouaissa, A. Rhattoy, July 2016.

C. Lai, H. Li, R. Lu, and X. Shen, “SE-AKA: a secure and efficient group authentication and key agreement protocol for LTE networks,” Computer Networks, vol. 57, no. 17, pp. 3492–3510, 2013.

C. Lai, H. Li, X. Li, and J. Cao, “A novel group access authentication and key agreement protocol for machine-type communication,” Transactions on Emerging Telecommunications Technologies, vol. 26, no. 3, pp. 414–431, 2015.

Junfeng Miao, Zhaoshun Wang, Mei Wang, Xiao Feng, Nan Xiao, Xiaoxue Sun, Security Authentication Protocol for Massive Machine Type Communication in 5G Networks, 2023.

A.N.Tentu, PVS Kumar, P Guddeti, Code based Secret Sharing Schemes for MANET, Indian Journal of Science and Technology, 2018/4/16 – 2018.

A.N.Tentu, Kamakshi Prasad V, V.Ch Venkaiah, Multi-Stage Secret Sharing Schemes Based on Asmuth's bloom sequence, CiiT Int. J. of Networking and Communication Engineering, Vol. 8, No.3, 2016.

A.N. Tentu,, Kamakshi Prasad V, V.Ch Venkaiah, Secret sharing schemes for multipartite access structures, Int. J. of Applied Engineering Research, ISSN 0973-4562 Vol. 11, No. 7, pp 5244-5249, 2016.

Y.-L. Huang, C. Y. Shen, S. Shieh, H.-J. Wang, and C.-C. Lin, “Provable secure AKA scheme with reliable key delegation in UMTS,” in Proceedings of the 3rd IEEE International Conference on Secure Software Integration Reliability Improvement (SSIRI ’09), pp. 243–252, Shanghai, China, July 2009.

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, Springer, Berlin, Germany, 2003.

D. Naccache, M. Just, B. Preneel et al., “Nyberg–rueppel signature scheme,” in Encyclopedia of Cryptography and Security, p. 879, Springer, Boston, Mass, USA, 2011.

J.-L. Huang, L.-Y. Yeh, and H.-Y. Chien, “ABAKA: an anonymous batch authenticated and key agreement scheme for value added services in vehicular ad hoc networks,” IEEE Transactions on Vehicular Technology, vol. 60, no. 1, pp. 248–262, 2011.

E. Klaoudatou, E. Konstantinou, G. Kambourakis, and S. Gritzalis, “A survey on cluster-based group key agreement protocols for WSNs,” IEEE Communications Surveys and Tutorials, vol. 13, no. 3, pp. 429–442, 2011.

T. Rams and P. Pacyna, “A survey of group key distribution schemes with self-healing property,” IEEE Communications Surveys and Tutorials, vol. 15, no. 2, pp. 820–842, 2013.

R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos, “Key management systems for sensor networks in the context of the Internet of Things,” Computers and Electrical Engineering, vol. 37, no. 2, pp. 147–159, 2011.

Steri G, Baldini G, Fovino IN, Neisse R, Goratti L (2016) A novel multi-hop secure LTED2D communication protocol for IoT scenarios. In: 2016 23rd international conference on telecommunications (ICT).

Taleb T, Kunz A (2012) Machine type communications in 3GPP networks: potential, challenges, and solutions. IEEE Commun Mag 50(3):178–184.

Ghavimi Fayezeh, Chen Hsiao-Hwa (2015) M2M communications in 3GPP LTE/LTE-A networks: architectures, service requirements, challenges, and applications. IEEE Communications Surv Tutor 17(2):1–26.

Chengzhe Lai,Hui Lix, Rongxing Lu, Xuemin “A Unified End-to-End Security Scheme for Machine-Type Communication in LTE Networks”ICCC,pp. 698–703, K. K. Jyothi and S. Chaudhari.

A. Singh, Vikas Tiwari, A.N.Tentu. ” Authenticated Key Agreement Scheme for IoT Networks Exploiting Lightweight Linear Algebraic Computations”, International Journal of Information Technology, Springer, 15(4), (2023), pp. 1-9

A.N.Tentu, Kallepu Raju, V. Ch. Venkaiah, Cryptanalysis of a Group Key Transfer Protocol: Generalization and Countermeasures, Journal of Combinatorics, Information & System Sciences (JCISS): A Quarterly International Scientific Journal, Vol.44, 2019.

Cao Jin, Ma Maode, Li Hui (2014) A survey on security aspects for LTE and LTE-A networks. IEEE Commun Surv Tutor 16(1):283–301.

Swamy Naidu A., A.N.Tentu., Ajeet Singh,” Reduced Complexity of LDPC Codes using Hard Decision Decoder”. In: Computer Networks, Big Data and IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 117, pp. 367–382. Springer, Singapore (2022).

Ajeet Singh, Vikas Tiwari, A.N.Tentu, Ashutosh Saxena. ” Securing Communication in IoT Environment using Lightweight Key Generation Assisted Homomorphic Authenticated Encryption”, In: Computer Communication, Networking and IoT, Lecture Notes in Networks and Systems (LNNS), vol 459, pp. 195-204. Springer, Singapore 2023.

Choi D, Hong S, Choi H-K (2014) A group-based security protocol for machine type communications in LTE-advanced. In: INFOCOM, pp.161–167.

Li J, Wen M, Tao (2016) Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-a networks group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE IoT J 3 (3):408–417.

Qi P, Xiangming W, Zhaoming L, Huan W (2016) Group controller-based authentication for machine type communication under LTE network. Conference on MEITE, pp. 223–226.

An Efficient Multi-Group Key Management Protocol for Internet of Things by Mohamed Ali Kandi, Hicham Lakhlef, Abdelmadjid Bouabdallah, yacine Challal, UMR CNRS 7253, 2019.

C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen, “CPAL: A conditional privacy-preserving authentication with access link ability for roaming service,” IEEE Internet of Things Journal, vol. 1, no. 1, pp. 46–57, 2014.

A.Singh, A.N.Tentu, V.Ch. Venkaiah. A Dynamic Key Management Paradigm for Secure Wireless Ad Hoc Network Communications”, International Journal of Information and Computer Security, Vol. 14, No. 3-4, pp 380-402, 2021.

A.N.Tentu, Venkaiah V.Ch., Kamakshi Prasad, CRT based Multi-Secret Sharing Schemes: Revisited, Journal of Security and Networks, Vol.13(1): pp.1-9 (2018).

J. Cao, M. Ma and H. Li,” A group-based authentication and key agreement for MTC in LTE networks”, Proc. Global Commun. Conf. (GLOBECOM’12), pp. 1017-1022, 2012.

V. Fajardo, J. Arkko, J. Loughney, “Diameter base protocol,” IETF (The Internet Engineering Task Force) Request for Comments, 2012.

J. Cao, Z. Yan, R. Ma, Y. Zhang, Y. Fu and H. Li,” LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks,” in IEEE Internet of Things Journal, vol. 7, no. 6, pp. 5329-5344, June 2020.

Liu, J., Tong, X., Wang, Z. et al. A centralized key management scheme for space networks with resistance of nonlinear channel noise. Wireless Netw 26, 4061–4078 (2020).

Rodhe, I., Rohner, C. (2010). Secure Overlays: Making Static Key Distribution Schemes Work with Mobile Base Stations in WSNs. In: Osipov,E., Kassler, A., Bohnert, T.M., Masip-Bruin, X. (eds) Wired/Wireless Internet Communications. WWIC 2010. Lecture Notes in Computer Science, vol 6074. Springer, Berlin, Heidelberg.

Maity, S., Hansdah, R.C. (2012). Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. CISS 2012. Lecture Notes in Computer Science, vol 7671.

A.N.Tentu; Renuka Cheeturi, An ECC based Anonymous Authentication Protocol for Internet of Things, 2023 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA). 2023.

A. Aijaz and A. H. Aghvami, “Cognitive machine-to-machine communications for internet-of-things: a protocol stack perspective,” IEEE Internet of Things Journal, vol. 2, no. 2, pp. 103–112, 2015.

M.M. Modiri, J. Mohajeri 2 M. Salmasizadeh, A novel group-based secure lightweight authentication and key agreement protocol for machine-type communication, Volume 29, Issue 6 - Serial Number 6, Transactions on Computer Science & Engineering and Electrical Engineering (D), pp3273-3287, 2023.

Downloads

Published

26.03.2024

How to Cite

Srinivas Kalime. (2024). Hierarchical Group Authentication and Key agreement for Machine Type Communication in LTE Networks. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 2914 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5919

Issue

Section

Research Article