Advertisement

HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks

  • V. SrinidhiEmail author
  • K. V. Lakshmy
  • M. Sethumadhavan
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 969)

Abstract

Machine Type Communication (MTC) is one among the fastest emerging technologies of mobile communication due to the massive increase in number of Network of things devices. The Third Generation Partnership Project (3GPP) has considered MTC as a part of Long Term Evolution (LTE) infrastructure in order to support various MTC applications. In order to communicate with the MTC server, an MTC device (MTCD) must authenticate to the network. The LTE network nodes suffers from signaling congestion when multiple MTCDs tries to authenticate to the network simultaneously. To overcome signaling congestion, several protocols have been proposed but the existing protocols use the concept of sharing of group key for authentication. We propose HGKA protocol to enhances the security compared to the existing schemes by avoiding the sharing or pre-storing of the group key to achieve group authentication. The proposed protocol employs authenticated group key agreement which can be used for group authentication and also provides forward secrecy and backward secrecy when an MTCD member gets added or leaves from the group by updating the group key.

Keywords

Machine Type Communication Device (MTCD) Long Term Evolution (LTE) Group key Group key agreement 

References

  1. 1.
    Lien, S.-Y., Chen, K.-C., Lin, Y.: Toward ubiquitous massive accesses in 3GPP machine-to-machine communications. IEEE Commun. Mag. 49(4), 66–74 (2011)CrossRefGoogle Scholar
  2. 2.
    3rd Generation Partnership Project, Technical Specification Group Services and System Aspects; Security aspects of machine-type and other mobile data applications communications enhancements (Release 12) 3GPP TR 33.868 V0.10.0Google Scholar
  3. 3.
    Mehmood, Y., Görg, C., Muehleisen, M., Timm-Giel, A.: Mobile M2M communication architectures, upcoming challenges, applications, and future directions. EURASIP J. Wirel. Commun. Netw. 2015(1), 250 (2015).  https://doi.org/10.1186/s13638-015-0479-yCrossRefGoogle Scholar
  4. 4.
    3rd Generation Partnership Project, Technical Specification Group Services and System Aspects; 3GPP System architecture evolution (SAE); Security architecture (Release 12) 3GPP TR 33.401 V12.5.0Google Scholar
  5. 5.
    Abdrabou, M.A., Elbayoumy, A.D.E., El-Wanis, E.A.: LTE authentication protocol (EPS-AKA) weaknesses solution. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS), pp. 434–441. IEEE (2015)Google Scholar
  6. 6.
    Mathi, S., Dharuman, L.: Prevention of desynchronization attack in 4G LTE networks using double authentication scheme. Procedia Comput. Sci. 89(Supplement C), 170–179 (2016)CrossRefGoogle Scholar
  7. 7.
    Cao, J., Ma, M., Li, H.: A group-based authentication and key agreement for MTC in LTE networks. In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 1017–1022 (2012)Google Scholar
  8. 8.
    Cao, J., Ma, M., Li, H.: Access authentication of mass device connections for MTC in LTE networks. SmartCR 4(4), 262–277 (2014)CrossRefGoogle Scholar
  9. 9.
    Lai, C., Li, H., Lu, R., Jiang, R., Shen, X.: SEGR: a secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks. In: 2014 IEEE International Conference on Communications (ICC), pp. 1011–1016. IEEE (2014)Google Scholar
  10. 10.
    Huang, J.-L., Yeh, L.-Y., Chien, H.-Y.: ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1), 248–262 (2011)CrossRefGoogle Scholar
  11. 11.
    Lai, C., Lu, R., Zheng, D., Li, H., Shen, X.S.: GLARM: group-based lightweight authentication scheme for resource-constrained machine to machine communications. Comput. Netw. 99, 66–81 (2016)CrossRefGoogle Scholar
  12. 12.
    Lai, C., Li, H., Lu, R., Jiang, R., Shen, X.: LGTH: a lightweight group authentication protocol for machine-type communication in LTE networks. In: 2013 IEEE Global Communications Conference (GLOBECOM), pp. 832–837. IEEE (2013)Google Scholar
  13. 13.
    Lai, C., Li, H., Lu, R., Shen, X.S.: SE-AKA: a secure and efficient group authentication and key agreement protocol for lte networks. Comput. Netw. 57(17), 3492–3510 (2013)CrossRefGoogle Scholar
  14. 14.
    Chen, Y.-W., Wang, J.-T., Chi, K.-H., Tseng, C.-C.: Group-based authentication and key agreement. Wireless Pers. Commun. 62(4), 965–979 (2012)CrossRefGoogle Scholar
  15. 15.
    Gupta, S., Parne, B.L., Chaudhari, N.S.: DGBES: dynamic group based efficient and secure authentication and key agreement protocol for MTC in LTE/LTE-A networks. Wireless Pers. Commun. 98, 2867–2899 (2018)CrossRefGoogle Scholar
  16. 16.
    Choi, D., Choi, H.-K., Lee, S.-Y.: A group-based security protocol for machine-type communications in LTE-advanced. Wireless Netw. 21(2), 405–419 (2015)CrossRefGoogle Scholar
  17. 17.
    Probidita, R., Roychoudhury, B., Saikia, D.K.: Hierarchical group based mutual authentication and key agreement for machine type communication in LTE and future 5G networks. Secur. Commun. Netw. (2017)Google Scholar
  18. 18.
    Fajardo, J.V., Arkko, J., Zorn, G.: Diameter base protocol. Technical Report, Internet Engineering Task Force (IETF)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.TIFAC-CORE in Cyber SecurityAmrita School of Engineering, Coimbatore, Amrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations