Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/12633
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2023-12-14T12:38:01Z-
dc.date.available2023-12-14T12:38:01Z-
dc.date.issued2023-
dc.identifier.citationGupta, S., Pradhan, A. K., Chaudhari, N. S., & Singh, A. (2023). LS-AKA: A lightweight and secure authentication and key agreement scheme for enhanced machine type communication devices in 5G smart environment. Sustainable Energy Technologies and Assessments. Scopus. https://doi.org/10.1016/j.seta.2023.103448en_US
dc.identifier.issn2213-1388-
dc.identifier.otherEID(2-s2.0-85171369421)-
dc.identifier.urihttps://doi.org/10.1016/j.seta.2023.103448-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/12633-
dc.description.abstractThe 3rd Generation Partnership Project (3GPP) has implemented the Authentication and Key Agreement (AKA) protocol in 5G communication networks to ensure user equipment privacy. Due to the high density and concurrent communication, the primary goal is to provide an efficient authentication for massive enhanced Machine Type Communication (eMTC) devices. However, certain security flaws have been discovered in the 5G-AKA protocol, and no scheme has yet been developed that meets the needs of a group of eMTC devices, such as signaling congestion avoidance, key forward/backward secrecy (KFS/KBS) establishment, resistance against malicious attacks, and session key secrecy. Furthermore, the current group-based 5G communication network techniques do not require the group membership update mechanism at each device joining or leaving the group. To address these issues, we present a lightweight and secure technique for assembling a secure ecosystem of eMTC devices in a 5G network. The protocol employs the incremental hash mechanism to complete group member joining/leaving activities. For a thorough assessment of LS-AKA, the Random Oracle Model (ROM) is used to do formal security proofs, and informal security analysis shows that it is resistant to malicious attacks. In addition, the performance and simulation results of the existing and suggested protocols in terms of signaling, communication, and computing overhead are analyzed. According to the assessment results, the LS-AKA protocol improves the privacy and confidentiality of the 5G-enabled smart environment. © 2023en_US
dc.language.isoenen_US
dc.publisherElsevier Ltden_US
dc.sourceSustainable Energy Technologies and Assessmentsen_US
dc.subject5G authentication schemeen_US
dc.subjectGroup membership managementen_US
dc.subjectInternet-of-Thingsen_US
dc.subjectRandom Oracle Modelen_US
dc.subjectResource-constraineden_US
dc.subjectSignaling congestionen_US
dc.titleLS-AKA: A lightweight and secure authentication and key agreement scheme for enhanced machine type communication devices in 5G smart environmenten_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: