Wireless Personal Communications

, Volume 101, Issue 2, pp 829–856 | Cite as

Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks

  • Garima Singh
  • Deepti D. Shrimankar


The machine-type communication (MTC) connects millions of the smart devices and provides a large number of applications through all of our lives. Every day, MTC is undergoing ubiquitous development and becoming a crucial application of the Internet of Things. To implement MTC in real-life, it is a big challenge to ensure the congestion control and security and privacy of the MTC devices (MTCDs) within the MTC network. When umpteen MTCDs concurrently try to access the network, each MTCD requires performing a distinct 3GPP specified access authentication procedure with the core network, that creates distressful signaling congestion over the MTC network. Taking into the consideration the aforementioned issues, in this research article, the authors suggest a dynamic group based access authentication and key agreement protocol for MTC called as EMTC-AKA protocol. The proposed protocol ensures strong mutual authentication between the MTC entities and identity protection of the MTCDs. Unlike, the other approaches, projected approach ensures confidentiality and integrity of the user/control plane data transmitted over the wireless interface and optimizes the need of group key update on each group membership update. We formally verified the suggested protocol on Automated Validation of the Internet Security Protocols and Applications (AVISPA) tool. The verification results and theoretical analysis of the protocol signify that the suggested approach is safe from the multiple malicious attacks and ensures less bandwidth consumption, signaling overhead, transmission cost and transmission delay over the MTC network.


Machine-type communication (MTC) Authentication Confidentiality Integrity Cryptography Long term evolution-advanced (LTE-A) 



This work was supported by the Visvesvaraya National Institute of Technology Nagpur, funded by Department of Electronics and Information Technology (Deity) Ministry of Communication and Information Technology, Government of India.


  1. 1.
    Zhang, Y., Chen, J., Hui, L., Cao, J., & Lai, C. (2014). Group-based authentication and key agreement for machine-type communication. International Journal of Grid and Utility Computing, 5(2), 19–21.CrossRefGoogle Scholar
  2. 2.
    Hwang, R.-H., Huang, C.-F., Lin, H.-W., & Wu, J.-J. (2016). Uplink access control for machine-type communications in LTE-A networks. Personal and Ubiquitous Computing, 20(6), 81–862.CrossRefGoogle Scholar
  3. 3.
    Jain, P., Hedman, P., & Zisimopoulos, H. (2012). Machine type communications in 3GPP systems. IEEE Communications Magazine, 50, 28–35.CrossRefGoogle Scholar
  4. 4.
    3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, Service requirements for Machine-Type Communications (MTC), (Release 12). 3GPP TS 22.368 V12.0.0 (2012-09).Google Scholar
  5. 5.
    3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, System Improvements for Machine-Type Communications (Release 11). 3GPP TR 23.888 V1.4.0 (2011-08).Google Scholar
  6. 6.
    Pan, Q., Wen, X., Lu, Z., & Wu, H. (2016). Group controller-based authentication for machine type communication under LTE network. In 2nd international conference on mechanical, electronic and information technology engineering (ICMITE 2016) (pp. 223–226).Google Scholar
  7. 7.
    Lai, C., Li, H., Lu, R., Jiang R., & Shen, X. (2013). LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks. In Globecom 2013—communication and information system security symposium (pp. 832–837).Google Scholar
  8. 8.
    Huang, J.-L., Yeh, L.-Y., & Yu, H. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 60(1), 248–262.CrossRefGoogle Scholar
  9. 9.
    Chin, W., Lin, Y., & Chen, H. (2016). A Framework of machine-to-machine authentication in smart grid: A two-layer approach. IEEE Communications Magazine, 54, 102–107.CrossRefGoogle Scholar
  10. 10.
    (2016). Ericsson Report Mobility on the Pulse of the Networked Society (June).Google Scholar
  11. 11.
    Alavikia, Z., & Ghasemi, A. (2018). Overload control in the network domain of LTE/LTE-A based machine type communications. Wireless Networks, 24, 1–16.CrossRefGoogle Scholar
  12. 12.
    3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, Security aspects of Machine-Type and other Mobile Data Applications Communications Enhancements, (Release 12). 3GPP TR 33.868 V0.11.0 (2012-11).Google Scholar
  13. 13.
    Zhang, W., Zhang, Y., Chen, J., & Li, H. (2013). End-to-end security scheme for machine type communication based on generic authentication architecture. Cluster Computing, 16, 861–871.CrossRefGoogle Scholar
  14. 14.
    3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3GPP System Architecture Evolution (SAE), Security architecture (Release 8). 3GPP TS 33.401 V8.8.0 (2011-06).Google Scholar
  15. 15.
    3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3GPP System Architecture Evolution (SAE), Security architecture (Release 11). 3GPP TS 33.401 V11.5.0 (2012-09).Google Scholar
  16. 16.
    Degefa, F. B., Lee, D., Kim, J., Choi, Y., & Won, D. (2016). Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Computer Networks, 94, 145–163.CrossRefGoogle Scholar
  17. 17.
    Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., & Seifert, J.-P. (2016). Practical attacks against privacy and availability in 4G/LTE mobile communication systems. In NDSS (February) (pp. 21–24).Google Scholar
  18. 18.
    Cao, J., Ma, M., Li, H., Zhang, Y., & Luo, Z. (2014). A survey on security aspects for LTE and LTE-A networks. IEEE Communications Surveys & Tutorials, 16(1), 283–302.CrossRefGoogle Scholar
  19. 19.
    Han, C., & Choi, H. (2014). Security analysis of handover key management in 4G LTE/SAE. Networks, 13(2), 457–468.Google Scholar
  20. 20.
    Park, Y., & Park, T. (2008). A survey of security threats on 4G networks. In 2007 IEEE Globecom workshops.Google Scholar
  21. 21.
    Hamandi, K., Abdo, J.-B., Elhajj, I.-H., Kayssi, A., & Chehab, A. (2016). A privacy-enhanced computationally-efficient and comprehensive LTE-AKA. Computer Communications, 98, 20–30.CrossRefGoogle Scholar
  22. 22.
    Jover, R.-P., Lackey, J., & Raghavan, A. (2014). Enhancing the security of LTE networks against jamming attacks. EURASIP Journal on Information Security, 2014(1), 7.CrossRefGoogle Scholar
  23. 23.
    3rd Generation Partnership Project, Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRA), Relay architectures for E-UTRA (LTE-Advanced) (Release 9). 3GPP TR 36.806 V0.2.0 (2009-11).Google Scholar
  24. 24.
    Cao, J., Ma, M., & Li, H. (2015). GBAAM: Group-based access authentication for MTC in LTE networks. Security and Communication Networks, 8(17), 3282–3299.CrossRefGoogle Scholar
  25. 25.
    Fu, A., Song, J., Li, S., Zhang, G., & Zhang, Y. (2016). A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks. Security and Communication Networks, 9(13), 2002–2014.Google Scholar
  26. 26.
    Choi, D., Choi, H.-K., & Lee, H. C.-S. (2015). A group-based security protocol for machine-type communications in LTE-advanced. Wireless Networks, 21(2), 405–419.CrossRefGoogle Scholar
  27. 27.
    Lai, C., Li, H., Lu, R., & Sherman, X. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510.CrossRefGoogle Scholar
  28. 28.
    Lai, C., Lu, R., Li, H., Zheng, D., & Shen, X.-S. (2015). Secure machine-type communications in LTE networks. Wireless Communications and Mobile Computing, 16(2), 1495–1509.Google Scholar
  29. 29.
    Jiang, R., Lai, C., Luo, J., Wang, X., & Wang, H. (2013). EAP-based group authentication and key agreement protocol for machine-type communications. International Journal of Distributed Sensor Networks, 9(11), 304601,14.Google Scholar
  30. 30.
    Lai, C., Li, H., Li, X., & Cao, J. (2013). A novel group access authentication and key agreement protocol for machine-type communication. Transactions on Emerging Telecommunications Technologies, 26(3), 414–431.CrossRefGoogle Scholar
  31. 31.
    Fu, A., Zhang, G., Zhang, Y., & ZHU, Z. (2013). GHAP: An efficient group-based handover authentication mechanism for IEEE 802. Wireless Personal Communications, 70(4), 1793–1810.CrossRefGoogle Scholar
  32. 32.
    Jung, K., Park, A., & Lee, S. (2010). Machine-type-communication (MTC) device grouping algorithm for congestion avoidance of MTC oriented LTE network. Communications in Computer and Information Science, 78, 167–178.CrossRefGoogle Scholar
  33. 33.
    Lee, H., Kim, D., Chung, B., & Yoon, H. (2008). Adaptive hysteresis using mobility correlation for fast handover. IEEE Communications Letters, 12(2), 152–154.CrossRefGoogle Scholar
  34. 34.
    3rd Generation Partnership Project, Technical Specification Group Service and System Aspects, Network Domain Security, Authentication Framework (Release 6). 3GPP TS 33.310 V1.10.0 (2004-02).Google Scholar
  35. 35.
    Moorthy, S., & Bhuvaneswaran, R. S. (2015). Cognitive group leader selection algorithm for wireless sensor networks. Research Journal of Applied Sciences, Engineering and Technology, 8(24), 2403–2407.CrossRefGoogle Scholar
  36. 36.
    Shayeji, M. H. A., Al-Azmi, A. R., Al-Azmi, A. R., & Samrajesh, M. D. (2011). Analysis and enhancements of leader elections algorithms in mobile ad hoc networks. ACEEE International Journal on Network Security, 2(4), 19–24.Google Scholar
  37. 37.
    Akele, G., Redwan, H., & Kim, K. (2014). Virtual group leader election algorithm in distributed WSN. In IEEE ICUFN 2014 (pp. 143–148).Google Scholar
  38. 38.
    Mohammad, S., & Pari, A. (2013). An incentive-based leader selection mechanism for mobile ad-hoc networks (MANETs), IFIP Wireless Days (WD), Valencia.Google Scholar
  39. 39.
    Takkinen, L. (2006). Analysing security protocols with AVISPA. TKK T-110.7290 Research Seminar on Network Security.Google Scholar
  40. 40.
    Dolev, D. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208.MathSciNetCrossRefzbMATHGoogle Scholar
  41. 41.
    Crypto++. Accessed 21 July 2017.

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringVisvesvaraya National Institute of TechnologyNagpurIndia

Personalised recommendations