A group-based security protocol for machine-type communications in LTE-advanced
- 634 Downloads
Machine-type communication (MTC) takes advantage of millions of devices being connected to each other in sensing our environment. A third-generation partnership project has been actively considering MTC as an enabler for ubiquitous computing and context-aware services. Until recently, we have not yet known how to productively manage the signaling traffic from these MTC devices because authentication requirements may impose such large signaling loads that they overwhelm the radio access of 4G cellular networks. This paper proposes the design of an efficient security protocol for MTC. This protocol is designed to be compatible with the incumbent system by being composed of only symmetric cryptography. Efficiency is attained by aggregating many authentication requests into a single one. The security and performance of the new design are evaluated via formal verification and theoretical analysis. Implementation of the proposed protocol in a real LTE-A network is provided through a feasibility analysis undertaken to prove the practicability of the protocol. Based on these evaluations, we contend that the proposed protocol is practical in terms of security and performance for MTC in LTE-Advanced.
KeywordsLong-term evolution advanced (LTE-A) Machine-type communications (MTC) Authentication and key agreement (AKA)
- 5.Zhang, Y., et al. (2012). Dynamic group based authentication protocol for machine type communications. In IEEE International Conference on Intelligent Networking and Collaborative Systems (InCoS). Google Scholar
- 7.Jiang, R., et al. (2013). EAP-based group authentication and key agreement protocol for machine-type communications. International Journal of Distributed Sensor Networks (Hindawi).Google Scholar
- 10.Cao, J., et al. (2012). A group-based authentication and key agreement for MTC in LTE networks. In IEEE Global Communications Conference (Globecom).Google Scholar
- 11.Wong, C., et al. (1998). Secure group communication using key graphs. In ACM Conferences on Applications, Technologies, Architectures, and Protocols for Computer Communication (Sigcomm).Google Scholar
- 12.Harney, H., et al. (1999). Logical key hierarchy protocol. IETF Internet Draft.Google Scholar
- 13.Pietro, R., et al. (2002). Efficient and secure keys management for wireless mobile communications. In ACM International Workshop on Principles of Mobile Computing (POMC).Google Scholar
- 14.Astely, D., et al. (2013). LTE release 12 and beyond. IEEE Communications Magazine, 51(7), 154–160.Google Scholar
- 15.Yang, M., et al. (2013). Solving the data overload: Device-to-device bearer control architecture for cellular data offloading. IEEE Vehicular Technology Magazine, 8(1), 31–39.Google Scholar
- 16.3GPP TS 33.102 ver.11.5.1. (2013). 3G security: security architecture (release 11).Google Scholar
- 17.3GPP TR 33.868 ver.12.0.0. (2014). Security aspects of machine-type communications (release 12).Google Scholar
- 19.Blanchet, B., Smyth, B., & Cheval. V. (2013). ProVerif 1.88: Automatic cryptographic protocol verifier, user manual and tutorial. Google Scholar
- 20.Crypto++. http://www.cryptopp.com/.