[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Secure & efficient intra-MME handovers via mobile relays within the LTE-A and future 5G high-speed train networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Nowadays, train networks are the most salient transportation mediums which demand higher data rates and reliable communication services for the onboard user equipments (UEs) over their long travels. The major issue associated with the high-speed train networks is that the frequent Long Term Evolution Advanced (LTE-A) Intra-MME handovers between the base stations generate high signaling overheads within the core network. Moreover, these LTE-A Intra-MME handovers are vulnerable to the desynchronization attack and cannot achieve forward key separation over the handovers. Therefore, the Intra-MME handovers cannot ensure access stratum (AS) secrecy. To improve the quality of services within the high-speed networks, recently, mobile relay nodes (MRNs) are incorporated into the LTE-A enabled high-speed vehicular networks. While the practice of these third-party MRNs may pose new security challenges. This research enlightens the loopholes which exist within the LTE-A Intra-MME handover protocol and proposes a more secure and efficient hierarchical grouping based Intra-MME handover protocol which is more suitable for the high-speed train networks. The proposed protocol promises to measure the minimum number of objects (base stations) over the measurement execution phase, optimizes the signaling overheads and reduces the handover processing time (handover interrupt time). Furthermore, to maintain the access stratum (AS) secrecy, the proposed protocol ensures secure handover session key establishment between the onboard UEs and the TDeNB. To demonstrate the effectiveness and efficiency of the proposed protocol, its performance is evaluated mathematically and security validations are carried out by various extensive simulations on Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and BAN logic.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Listing 1
Listing 2
Listing 3
Listing 4
Listing 5
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Lee SK, Bae M, Kim H (2017) Future of iot networks: a survey. Appl Sci 7:10

    Google Scholar 

  2. Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L (2017) Authentication protocols for internet of things: a comprehensive survey. Secur Commun Netw, 2017

  3. Saxena N, Grijalva S, Chaudhari N (2016) Authentication protocol for an iot-enabled lte network. ACM Trans Internet Technol (TOIT) 16(4):25

    Article  Google Scholar 

  4. Singh G, Chitransh A, Tanwar G (2016) Monitoring ambient light conditions of a school using iot. In: 2016 3rd International conference on computing for sustainable global development (INDIACom). IEEE, pp 3446–3449

  5. https://comarkcorp.com/internet-of-things/, Access on: 12/01/2019

  6. Kanchan S, Singh G, Chaudhari N (2018) Re-encrypting secure and efficient routing in vanet groups using sharable clouds. In: 2018 4th International conference on recent advances in information technology (RAIT). IEEE, pp 1–6

  7. Xu L, Wang J, Zhang H, Gulliver TA (2017) Performance analysis of iaf relaying mobile d2d cooperative networks. J Franklin Inst 354(2):902–916

    Article  MATH  Google Scholar 

  8. Xu L, Wang J, Liu Y, Shi W, Gulliver TA (2018) Outage performance for idf relaying mobile cooperative networks. Mob Netw Appl 23(6):1496–1501

    Article  Google Scholar 

  9. Han C-K, Choi H-K (2014) Security analysis of handover key management in 4g lte/sae networks. IEEE Trans Mob Comput 13(2):457–468

    Article  Google Scholar 

  10. Singh G, Shrimankar D (2018) A privacy-preserving authentication protocol with secure handovers for the lte/lte-a networks. Sādhanā 43(8):128

    Article  Google Scholar 

  11. Singh G, Shrimankar DD (2018) Dynamic group based efficient access authentication and key agreement protocol for mtc in lte-a networks. Wirel Pers Commun 101(2):829–856

    Article  Google Scholar 

  12. Singh G, Shrimankar D (2017) Security analysis of lte/sae networks with the possibilities of tampering e-utran on ns3. In: 2017 8th International conference on computing, communication and networking technologies (ICCCNT). IEEE, pp 1–7

  13. Pan M-S, Lin T-M, Chen W-T (2015) An enhanced handover scheme for mobile relays in lte-a high-speed rail networks. IEEE Trans Veh Technol 64(2):743–756

    Article  Google Scholar 

  14. 3GPP (2016) 3rd generation partnership project; technical specification group service and system aspects; 3gpp system architecture evolution (sae); security architecture. Technical Specification, 3GPP TS, vol 3GPP TS 33.401, p V14.1.0, 14

  15. 3rd generation partnership project; technical specification group service and system aspects; network domain security; authentication framework; (release 6), 3GPP TS, vol 33.310, p V1.1.0

  16. Cao J, Ma M, Li H (2017) G2rha: group-to-route handover authentication scheme for mobile relays in lte-a high-speed rail networks. IEEE Trans Veh Technol 66(11):9689–9701

    Article  Google Scholar 

  17. Cao J, Li H, Ma M, Li F (2015) Ugha: uniform group-based handover authentication for mtc within e-utran in lte-a networks. In: 2015 IEEE International conference on communications (ICC). IEEE, pp 7246–7251

  18. Qiu Y, Ma M (2018) Secure group mobility support for 6lowpan networks. IEEE Internet Things J 5 (2):1131–1141

    Article  Google Scholar 

  19. Huang Q, Zhou J, Tao C, Yi S, Lei M (2012) Mobile relay based fast handover scheme in high-speed mobile environment. In: 2012 IEEE Vehicular technology conference (VTC Fall). IEEE, pp 1–6

  20. Lai C, Li H, Lu R, Jiang R, Shen X (2014) Segr: a secure and efficient group roaming scheme for machine to machine communications between 3gpp and wimax networks. In: 2014 IEEE International Conference on Communications (ICC). IEEE, pp 1011–1016

  21. Fu A, Lan S, Huang B, Zhu Z, Zhang Y (2012) A novel group-based handover authentication scheme with privacy preservation for mobile wimax networks. IEEE Commun Lett 16(11):1744–1747

    Article  Google Scholar 

  22. Kong Q, Lu R, Chen S, Zhu H (2017) Achieve secure handover session key management via mobile relay in lte-advanced networks. IEEE Internet Things J 4(1):29–39

    Google Scholar 

  23. 3GPP 3rd generation partnership project; technical specification group services and system aspects; 3gpp system architecture evolution (sae); security architecture (release 8), Technical Specification, 3GPP TS, vol 3GPP TS 33.401, p V8.8.0, 2011–06

  24. 3GPP 3rd generation partnership project; technical specification group radio access network; study on further enhancements to lte device to device (d2d), user equipment (ue) to network relays for internet of things (iot) and wearables; (release 15), Technical Specification, 3GPP TS, vol 3GPP TR 36.746, p V15.1.0, 2017–12

  25. Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Drielsma PH, Héam P-C, Kouchnarenko O, Mantovani J et al (2005) The avispa tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification. Springer, pp 281–285

  26. Bleeker A, Meertens L (1997) A semantics for ban logic. In: Proceedings of the DIMACS workshop on design and formal verification of security protocols

  27. Cao J, Li H, Ma M, Li F (2018) Uppgha: uniform privacy preservation group handover authentication mechanism for mmtc in lte-a networks. Secur Commun Netw, 2018

  28. Cervesato I (2001) The dolev-yao intruder is the most powerful attacker. In: 16th Annual symposium on logic in computer science—LICS, vol 1

  29. Kanchan S, Singh G, Chaudhari N (2019) Sapsc: signrecrypting authentication protocol using shareable clouds in vanet groups. IET Intelligent Transport Systems

  30. Huang Q, Zhou J, Tao C, Yi S, Lei M (2012) Mobile relay based fast handover scheme in high-speed mobile environment. In: 2012 IEEE Vehicular technology conference (VTC Fall). IEEE , pp 1–6

  31. Cao J, Li H, Ma M, Zhang Y, Lai C (2012) A simple and robust handover authentication between henb and enb in lte networks. Comput Netw 56(8):2119–2131

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the Visvesvaraya National Institute of Technology Nagpur, funded by Ministry of Electronics and Information Technology (Meity) Ministry of Communication and Information Technology, Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Garima Singh.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, G., Shrimankar, D. Secure & efficient intra-MME handovers via mobile relays within the LTE-A and future 5G high-speed train networks. Peer-to-Peer Netw. Appl. 13, 762–779 (2020). https://doi.org/10.1007/s12083-019-00816-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00816-1

Keywords

Navigation