Abstract
Nowadays, train networks are the most salient transportation mediums which demand higher data rates and reliable communication services for the onboard user equipments (UEs) over their long travels. The major issue associated with the high-speed train networks is that the frequent Long Term Evolution Advanced (LTE-A) Intra-MME handovers between the base stations generate high signaling overheads within the core network. Moreover, these LTE-A Intra-MME handovers are vulnerable to the desynchronization attack and cannot achieve forward key separation over the handovers. Therefore, the Intra-MME handovers cannot ensure access stratum (AS) secrecy. To improve the quality of services within the high-speed networks, recently, mobile relay nodes (MRNs) are incorporated into the LTE-A enabled high-speed vehicular networks. While the practice of these third-party MRNs may pose new security challenges. This research enlightens the loopholes which exist within the LTE-A Intra-MME handover protocol and proposes a more secure and efficient hierarchical grouping based Intra-MME handover protocol which is more suitable for the high-speed train networks. The proposed protocol promises to measure the minimum number of objects (base stations) over the measurement execution phase, optimizes the signaling overheads and reduces the handover processing time (handover interrupt time). Furthermore, to maintain the access stratum (AS) secrecy, the proposed protocol ensures secure handover session key establishment between the onboard UEs and the TDeNB. To demonstrate the effectiveness and efficiency of the proposed protocol, its performance is evaluated mathematically and security validations are carried out by various extensive simulations on Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and BAN logic.
Similar content being viewed by others
References
Lee SK, Bae M, Kim H (2017) Future of iot networks: a survey. Appl Sci 7:10
Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L (2017) Authentication protocols for internet of things: a comprehensive survey. Secur Commun Netw, 2017
Saxena N, Grijalva S, Chaudhari N (2016) Authentication protocol for an iot-enabled lte network. ACM Trans Internet Technol (TOIT) 16(4):25
Singh G, Chitransh A, Tanwar G (2016) Monitoring ambient light conditions of a school using iot. In: 2016 3rd International conference on computing for sustainable global development (INDIACom). IEEE, pp 3446–3449
https://comarkcorp.com/internet-of-things/, Access on: 12/01/2019
Kanchan S, Singh G, Chaudhari N (2018) Re-encrypting secure and efficient routing in vanet groups using sharable clouds. In: 2018 4th International conference on recent advances in information technology (RAIT). IEEE, pp 1–6
Xu L, Wang J, Zhang H, Gulliver TA (2017) Performance analysis of iaf relaying mobile d2d cooperative networks. J Franklin Inst 354(2):902–916
Xu L, Wang J, Liu Y, Shi W, Gulliver TA (2018) Outage performance for idf relaying mobile cooperative networks. Mob Netw Appl 23(6):1496–1501
Han C-K, Choi H-K (2014) Security analysis of handover key management in 4g lte/sae networks. IEEE Trans Mob Comput 13(2):457–468
Singh G, Shrimankar D (2018) A privacy-preserving authentication protocol with secure handovers for the lte/lte-a networks. Sādhanā 43(8):128
Singh G, Shrimankar DD (2018) Dynamic group based efficient access authentication and key agreement protocol for mtc in lte-a networks. Wirel Pers Commun 101(2):829–856
Singh G, Shrimankar D (2017) Security analysis of lte/sae networks with the possibilities of tampering e-utran on ns3. In: 2017 8th International conference on computing, communication and networking technologies (ICCCNT). IEEE, pp 1–7
Pan M-S, Lin T-M, Chen W-T (2015) An enhanced handover scheme for mobile relays in lte-a high-speed rail networks. IEEE Trans Veh Technol 64(2):743–756
3GPP (2016) 3rd generation partnership project; technical specification group service and system aspects; 3gpp system architecture evolution (sae); security architecture. Technical Specification, 3GPP TS, vol 3GPP TS 33.401, p V14.1.0, 14
3rd generation partnership project; technical specification group service and system aspects; network domain security; authentication framework; (release 6), 3GPP TS, vol 33.310, p V1.1.0
Cao J, Ma M, Li H (2017) G2rha: group-to-route handover authentication scheme for mobile relays in lte-a high-speed rail networks. IEEE Trans Veh Technol 66(11):9689–9701
Cao J, Li H, Ma M, Li F (2015) Ugha: uniform group-based handover authentication for mtc within e-utran in lte-a networks. In: 2015 IEEE International conference on communications (ICC). IEEE, pp 7246–7251
Qiu Y, Ma M (2018) Secure group mobility support for 6lowpan networks. IEEE Internet Things J 5 (2):1131–1141
Huang Q, Zhou J, Tao C, Yi S, Lei M (2012) Mobile relay based fast handover scheme in high-speed mobile environment. In: 2012 IEEE Vehicular technology conference (VTC Fall). IEEE, pp 1–6
Lai C, Li H, Lu R, Jiang R, Shen X (2014) Segr: a secure and efficient group roaming scheme for machine to machine communications between 3gpp and wimax networks. In: 2014 IEEE International Conference on Communications (ICC). IEEE, pp 1011–1016
Fu A, Lan S, Huang B, Zhu Z, Zhang Y (2012) A novel group-based handover authentication scheme with privacy preservation for mobile wimax networks. IEEE Commun Lett 16(11):1744–1747
Kong Q, Lu R, Chen S, Zhu H (2017) Achieve secure handover session key management via mobile relay in lte-advanced networks. IEEE Internet Things J 4(1):29–39
3GPP 3rd generation partnership project; technical specification group services and system aspects; 3gpp system architecture evolution (sae); security architecture (release 8), Technical Specification, 3GPP TS, vol 3GPP TS 33.401, p V8.8.0, 2011–06
3GPP 3rd generation partnership project; technical specification group radio access network; study on further enhancements to lte device to device (d2d), user equipment (ue) to network relays for internet of things (iot) and wearables; (release 15), Technical Specification, 3GPP TS, vol 3GPP TR 36.746, p V15.1.0, 2017–12
Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Drielsma PH, Héam P-C, Kouchnarenko O, Mantovani J et al (2005) The avispa tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification. Springer, pp 281–285
Bleeker A, Meertens L (1997) A semantics for ban logic. In: Proceedings of the DIMACS workshop on design and formal verification of security protocols
Cao J, Li H, Ma M, Li F (2018) Uppgha: uniform privacy preservation group handover authentication mechanism for mmtc in lte-a networks. Secur Commun Netw, 2018
Cervesato I (2001) The dolev-yao intruder is the most powerful attacker. In: 16th Annual symposium on logic in computer science—LICS, vol 1
Kanchan S, Singh G, Chaudhari N (2019) Sapsc: signrecrypting authentication protocol using shareable clouds in vanet groups. IET Intelligent Transport Systems
Huang Q, Zhou J, Tao C, Yi S, Lei M (2012) Mobile relay based fast handover scheme in high-speed mobile environment. In: 2012 IEEE Vehicular technology conference (VTC Fall). IEEE , pp 1–6
Cao J, Li H, Ma M, Zhang Y, Lai C (2012) A simple and robust handover authentication between henb and enb in lte networks. Comput Netw 56(8):2119–2131
Acknowledgements
This work is supported by the Visvesvaraya National Institute of Technology Nagpur, funded by Ministry of Electronics and Information Technology (Meity) Ministry of Communication and Information Technology, Government of India.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, G., Shrimankar, D. Secure & efficient intra-MME handovers via mobile relays within the LTE-A and future 5G high-speed train networks. Peer-to-Peer Netw. Appl. 13, 762–779 (2020). https://doi.org/10.1007/s12083-019-00816-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-019-00816-1