2016
DOI: 10.1145/2981547
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Protocol for an IoT-Enabled LTE Network

Abstract: The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol of the long-term evolution (LTE) network does not support Internet of Things (IoT) objects and has several security limitations, including transmission of the object’s (user/device) identity and key set identifier in plaintext over the network, synchronization, large overhead, limited identity privacy, and security attack vulnerabilities. In this article, we propose a new secure and efficient AKA protocol for the LTE network th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(40 citation statements)
references
References 17 publications
0
40
0
Order By: Relevance
“…Frequent mobility of users in their visiting networks is out of the scope of this work. However, in case (i) when the users belong to different geographical regions, their authentication will be achieved using the process discussed in the EasySMS protocol [16], and (ii) when the user moves to a visiting network, the authentication is completed by the process mentioned in SAKA [36], ES-AKA [39], and IoT-enabled LTE AKA [55], respectively, in 2G, 3G, and 4G networks. The additional communication overhead in BAS-VAS will include routing transmitted information from the Visiting-AS to the Home-AS.…”
Section: Discussionmentioning
confidence: 99%
“…Frequent mobility of users in their visiting networks is out of the scope of this work. However, in case (i) when the users belong to different geographical regions, their authentication will be achieved using the process discussed in the EasySMS protocol [16], and (ii) when the user moves to a visiting network, the authentication is completed by the process mentioned in SAKA [36], ES-AKA [39], and IoT-enabled LTE AKA [55], respectively, in 2G, 3G, and 4G networks. The additional communication overhead in BAS-VAS will include routing transmitted information from the Visiting-AS to the Home-AS.…”
Section: Discussionmentioning
confidence: 99%
“…The symmetric encryption is used by four schemes, namely, [62], [96], [69], [78], in order to provide user anonymity. Specifically, Chen et al [62] use the Advanced Encryption Standard (AES) as the symmetric data encryption algorithm for mobile devices.…”
Section: B Countermeasuresmentioning
confidence: 99%
“…The authors proposed an advanced Identity Management scheme, called AIM, in order to guarantee mutual authentication, privacy, and tracking avoidance for 4G networks. According to Saxena et al [69], the EPS-AKA protocol of the LTE network does not support Internet of Things (IoT). Specifically, the authors proposed an authentication protocol for an IoT-Enabled LTE Network that is entirely based on the symmetric key cryptosystem.…”
Section: B Mutual Authentication With Privacymentioning
confidence: 99%
“…Our analysis of the key hierarchy reveals that the existing LTE networks are prone to compromise due to weak key management. This LTE-K based vulnerability is coined as a single key problem [14,15]. So far, there are no sufficient solutions towards LTE security vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Once the source key (LTE-K) is compromised [11], the whole key hierarchy becomes vulnerable as LTE-K is the seed for subsequent key derivatives. This LTE-K based vulnerability is coined as a single key problem in [14,15].…”
mentioning
confidence: 99%