An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks

An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In recent years, the world of wireless telecommunications is in full progress. Indeed, although the evolution of 4G mobile networks continues, the standardization work of the 5G networks is in full progress. The connected vehicle is part of the services expected from 5G. Indeed, the interconnection between vehicles promises a safer and more enjoyable driving experience. However, as the huge number of vehicle devices are increasing day by day and each vehicle must perform a full authentication procedure to reach to the network, network congestion may occur when a group of vehicles requires simultaneous access, moreover this can have a decisive effect on the promised high rate of 5G. The EPS-AKA authentication mechanism used in 4G networks is too insufficient to handle a large number of mobile devices. In this context, our article aims to define a reliable solution for the authentication of a group of vehicles simultaneous in 5G cellular networks. A reauthentication procedure is also proposed. Analysis results obtained using the SPAN tool has proven that authentication and privacy objectives are met. In addition, elaborate performance evaluations in terms of communication signalling and computational overhead demonstrate that our protocol is more efficient than those existing protocols.


    1. 1)
      • 1. Telit White Paper: ‘LTE evolution: standardization & deployment, the long run to 5G’, January 2018.
    2. 2)
      • 2. Who & how: making 5G NR standards understanding key features of 5G NR standards and Samsung's contribution’, SUMSUNG, 2018.
    3. 3)
      • 3. Ericsson, A.B.: ‘5G technology update’, February 2018.
    4. 4)
      • 4. Saqlain, J.: ‘IoT and 5G history evolution and its architecture their compatibility and future’, PhD, Subtitle Metropolia University of Applied Sciences, March 2018.
    5. 5)
      • 5. 3GPP TS 22.185V14.3.0: ‘LTE; Service requirements for V2X services (Release 14)’, March 2017.
    6. 6)
      • 6. 5G Americas: ‘Cellular V2X Communications Towards 5G’, March 2018.
    7. 7)
      • 7. 3GPP TS 33.185V14.0.0.: ‘Security aspect for LTE support of vehicle-to-everything (V2X) services’, July 2017.
    8. 8)
      • 8. Memon, I.: ‘A secure and efficient communication scheme with authenticated key establishment protocol for road networks’, Wirel. Pers. Commun., 2015, 85, pp. 11671191.
    9. 9)
      • 9. Hegde, M.R.M., Memon, I.: ‘A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card’, Int. J. Commun. Syst.. 2018, 31, (11), p. e3701.
    10. 10)
      • 10. 3GPP TS 33.401V13.2.0: ‘3rd generation partnership project; technical specification group services and system aspects; 3GPP system architecture evolution (SAE); security architecture (release 13)’, March 2016.
    11. 11)
      • 11. Lai, C., Li, H., Lu, R., et al: ‘SE-AKA: a secure and efficient group authentication and key agreement protocol for LTE networks’, Comput. Netw., 2013, 57, (17), pp. 34923510.
    12. 12)
      • 12. Lai, C., Lu, R., Zheng, D., et al: ‘GLARM: a group-based lightweight authentication scheme for resource-constrained machine to machine communications’, Comput. Netw., 2016, 99, pp. 6681.
    13. 13)
      • 13. Broustis, I., Sundaram, G.S., Viswanathan, H.: ‘Group authentication: a new paradigm for emerging applications’, Bell Labs Tech. J., 2012, 17, (3), pp. 157173.
    14. 14)
      • 14. Cao, J., Ma, M., Li, H.: ‘GBAAM: group-based access authentication for MTC in LTE networks’, Sec. Commun. Netw., 2015, 8, (17), pp. 32823299.
    15. 15)
      • 15. Hasrouny, H., Bassil, C., Samhat, A., et al: ‘Group-based authentication in v2V’. 2015 Fifth Int. Conf. on Digital Information and Communication Technology and its Applications (DICTAP), Beirut, Lebanon, May 2015.
    16. 16)
      • 16. Kim, S., Lee, I.: ‘A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs’, Int. J. Sec. Appl., 2014, 8, (2), pp. 924.
    17. 17)
      • 17. Jesudoss, A., Raja, S., Park, S.: ‘GRAS: A group reliant authentication scheme for V2V communication in VANET’, Syst., Cybern. Inf., 2013, 11, (6), pp. 4752.
    18. 18)
      • 18. Panja, B., Morrison, D., Meharia, P., et al: ‘Group security of V2Vusing cloud computing processing and 4G wireless services’, Int. J. Nnext-Gener. Comput., 2014, 5, (3), pp. 218232.
    19. 19)
      • 19. 3GPP TS 33.401, V15.2.0: ‘3rd generation partnership project; technical specification group services and system aspects; 3GPP system architecture evolution (SAE); security architecture (release 15)’, January 2018.
    20. 20)
      • 20. Lai, C., Li, H., Lu, R., et al: ‘LGTH: ‘A lightweight group authentication protocol for machine-type communication in LTE networks’. 2013 IEEE Global Communications Conf. Globecom, Atlanta, GA, USA, December 2013.
    21. 21)
      • 21. AVISPA v1.1 User Manual, June 2006.
    22. 22)
      • 22. Glouche, Y., Genet, T., Heen, O., et al: ‘A security protocol animator tool for AVISPA’. ARTIST2 Workshop on Security Specification and Verification of Embedded Systems, Pisa, Italy, May 2006.

Related content

This is a required field
Please enter a valid email address