Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/12633
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chaudhari, Narendra S. | en_US |
dc.date.accessioned | 2023-12-14T12:38:01Z | - |
dc.date.available | 2023-12-14T12:38:01Z | - |
dc.date.issued | 2023 | - |
dc.identifier.citation | Gupta, S., Pradhan, A. K., Chaudhari, N. S., & Singh, A. (2023). LS-AKA: A lightweight and secure authentication and key agreement scheme for enhanced machine type communication devices in 5G smart environment. Sustainable Energy Technologies and Assessments. Scopus. https://doi.org/10.1016/j.seta.2023.103448 | en_US |
dc.identifier.issn | 2213-1388 | - |
dc.identifier.other | EID(2-s2.0-85171369421) | - |
dc.identifier.uri | https://doi.org/10.1016/j.seta.2023.103448 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/12633 | - |
dc.description.abstract | The 3rd Generation Partnership Project (3GPP) has implemented the Authentication and Key Agreement (AKA) protocol in 5G communication networks to ensure user equipment privacy. Due to the high density and concurrent communication, the primary goal is to provide an efficient authentication for massive enhanced Machine Type Communication (eMTC) devices. However, certain security flaws have been discovered in the 5G-AKA protocol, and no scheme has yet been developed that meets the needs of a group of eMTC devices, such as signaling congestion avoidance, key forward/backward secrecy (KFS/KBS) establishment, resistance against malicious attacks, and session key secrecy. Furthermore, the current group-based 5G communication network techniques do not require the group membership update mechanism at each device joining or leaving the group. To address these issues, we present a lightweight and secure technique for assembling a secure ecosystem of eMTC devices in a 5G network. The protocol employs the incremental hash mechanism to complete group member joining/leaving activities. For a thorough assessment of LS-AKA, the Random Oracle Model (ROM) is used to do formal security proofs, and informal security analysis shows that it is resistant to malicious attacks. In addition, the performance and simulation results of the existing and suggested protocols in terms of signaling, communication, and computing overhead are analyzed. According to the assessment results, the LS-AKA protocol improves the privacy and confidentiality of the 5G-enabled smart environment. © 2023 | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier Ltd | en_US |
dc.source | Sustainable Energy Technologies and Assessments | en_US |
dc.subject | 5G authentication scheme | en_US |
dc.subject | Group membership management | en_US |
dc.subject | Internet-of-Things | en_US |
dc.subject | Random Oracle Model | en_US |
dc.subject | Resource-constrained | en_US |
dc.subject | Signaling congestion | en_US |
dc.title | LS-AKA: A lightweight and secure authentication and key agreement scheme for enhanced machine type communication devices in 5G smart environment | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: