Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4892
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:55Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:55Z-
dc.date.issued2019-
dc.identifier.citationParne, B. L., Gupta, S., & Chaudhari, N. S. (2019). PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks. Peer-to-Peer Networking and Applications, 12(5), 1156-1177. doi:10.1007/s12083-019-00785-5en_US
dc.identifier.issn1936-6442-
dc.identifier.otherEID(2-s2.0-85068969448)-
dc.identifier.urihttps://doi.org/10.1007/s12083-019-00785-5-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4892-
dc.description.abstractIn the mobile telecommunication network, Long term Evolution (LTE) is the most successful technological development for the industrial services and applications. The Evolved Packet System based Authentication and Key Agreement (EPS-AKA) was the first protocol proposed to authenticate the communication entities in the LTE network. But, the EPS-AKA protocol suffers from the single key exposure problem and is susceptible to various security attacks. Also, the protocol incurs high bandwidth consumption and computation overhead over the communication network. Moreover, the protocol doesn’t support the Internet of Things (IoT) based applications and has several security issues such as the privacy violation of the user identity and key set identifier (KSI). To resolve the above problems, various AKA protocols were proposed by the researchers. Unfortunately, none of the protocols succeeded to overcome the privacy preservation and single key exposure problem from the communication network. In this paper, we propose the performance and security enhanced (PSE-AKA) protocol for IoT enabled LTE/LTE-A network. The proposed protocol follows the cocktail therapy to generate the authentication vectors that improves the performance in terms of computation and communication overhead. The protocol preserves the privacy of objects, protects the KSI and avoids the identified attacks from the communication network. The formal verification and security analysis of the proposed protocol is carried out using the BAN logic and AVISPA tool respectively. The security analysis shows that the protocol achieves the security goals and secure against various known attacks. Finally, the performance analysis shows that the proposed protocol generates the less overhead and reduces the bandwidth consumption from the network. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.en_US
dc.language.isoenen_US
dc.publisherSpringer New York LLCen_US
dc.sourcePeer-to-Peer Networking and Applicationsen_US
dc.subjectAuthenticationen_US
dc.subjectBandwidthen_US
dc.subjectComputation theoryen_US
dc.subjectInternet of thingsen_US
dc.subjectInternet protocolsen_US
dc.subjectLong Term Evolution (LTE)en_US
dc.subjectMobile telecommunication systemsen_US
dc.subjectSecurity systemsen_US
dc.subjectTelecommunication servicesen_US
dc.subjectAuthentication and key agreementsen_US
dc.subjectAuthentication key agreement protocolsen_US
dc.subjectAVISPAen_US
dc.subjectKFS/KBSen_US
dc.subjectLte/lte-aen_US
dc.subjectMobile telecommunication networksen_US
dc.subjectPrivacy preservationen_US
dc.subjectTechnological developmenten_US
dc.subjectNetwork securityen_US
dc.titlePSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networksen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: