Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4897
Title: PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network
Authors: Chaudhari, Narendra S.
Keywords: Authentication;Function evaluation;Hash functions;Internet protocols;Long Term Evolution (LTE);Mobile security;Mobile telecommunication systems;Multimedia services;Network protocols;Wireless telecommunication systems;AVISPA;Communication entities;Computation overheads;Handover authentications;Mobile multimedia services;Mutual authentication;Performance evaluations;Random Oracle model;Network security
Issue Date: 2019
Publisher: Springer New York LLC
Citation: Gupta, S., Parne, B. L., & Chaudhari, N. S. (2019). PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network. Peer-to-Peer Networking and Applications, 12(4), 989-1011. doi:10.1007/s12083-018-0703-8
Abstract: In order to accomplish the increasing security demands of handover-based applications such as mobile multimedia services and transportation system, various handover Authentication and Key Agreement (AKA) protocols were proposed by the researchers in Long Term Evolution-Advanced (LTE-A) network. However, these AKA protocols fail to preserve the privacy of communication entities and suffer from numerous attacks. In addition, these protocols incur high network overhead which doesn’t suit for the resource-constrained mobile devices in LTE/LTE-A network. Also, the protocols can’t establish the key forward/backward secrecy (KFS/KBS) and overcome the key escrow problem. To avoid the above-mentioned security issues, we propose the provably secure and efficient handover (PSEH)-AKA protocol based on double-trapdoor chameleon hash function. The PSEH-AKA protocol is proven secure under random oracle model to obtain the mutual authentication, session key secrecy, integrity and resistance from malicious attacks. The proposed handover protocol accommodates all the security demands such as KFS/KBS, privacy-preservation and establishes the secure session key between the communication entities. Furthermore, the formal verification using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool shows the correctness and informal analysis shows the security properties of the protocol. The performance evaluation of the PSEH-AKA protocol is carried out with existing handover AKA protocols in terms of storage, communication, and computation overhead. The evaluation results show that the protocol achieves substantial efficiency and secure against the identified attacks. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.
URI: https://doi.org/10.1007/s12083-018-0703-8
https://dspace.iiti.ac.in/handle/123456789/4897
ISSN: 1936-6442
Type of Material: Journal Article
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: