A Systematic Dynamic Key Agreement Mechanism for LTE Advanced Networks in the Internet of Things
Saraswathi Pedada1, Muralidhara Rao Patruni2, Reddyprasad A3, RK Chandana Mani4
1Saraswathi Pedada, Department of Computer Science and Engineering, GITAM, Visakhapatnam (Andhra Pradesh), India.
2Muralidhar Patruni, Research Scholar, School of Computer Science and Engineering, VIT, Vellore (Tamil Nadu), India.
3Reddy Prasad A, Department of CSE, Mother Theresa Institute of Engineering and Technology, Palamner (Andhra Pradesh), India.
4RK Chandana Mani, Research Scholar, School of Computer Science and Engineering, VIT, Vellore (Tamil Nadu), India.
Manuscript received on 24 November 2019 | Revised Manuscript received on 12 December 2019 | Manuscript Published on 30 December 2019 | PP: 302-307 | Volume-9 Issue-2S3 December 2019 | Retrieval Number: B10311292S319/2019©BEIESP | DOI: 10.35940/ijitee.B1031.1292S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Of late, Session Initiation Protocol (SIP) has become one of the popular signaling protocols especially for the multimedia communication system. Various protocols have been proposed by researchers to ensure access independence, authentication, and Key Agreement security characteristic. With the extensive growth of cellular networks, mobile traffic connected with the advancements of the wireless communication channel. In this scenario, Machine Type Communication (MTC) plays a crucial role in line with Long Term Evaluation-Advanced Networks as their communication happened between Machine to machine without human intervention. In order to reach Mobile Type Transmission (MTT) security condition, the access verification process required to pursue the verification and Key Agreement protocol. Moreover, the development of Group premised communication and individual authentication mechanisms to every Machine Type Communication device (MTTD) would lead to signal-congestion in real-time networking scenarios. Jinguo et al. proposed a Group-Based Verification and Key-Agreement protocol with dynamically updating policy for mutual authentication. Especially, they chose an asynchronous secret shared key merged to work with Diffie-Hellman protocol for establishing disjoint verification and session-key establishment across LTE Advanced Networks. However, the DH algorithm could not provide message integrity to upgrade the security feature namely integrity. In this paper, the algorithms Advanced Encryption Standard (AES) in addition to Elliptic Curve Diffie-Hellman (ECDH) can be integrated called an Elliptic Curve Digital Signature Algorithm (ECDSA)” which addresses verification and integrity.
Keywords: Verification and Key Agreement, GR-AKA, Diffie-Hellman, AES, ECDH, ECDSA.
Scope of the Article: Internet of Things