{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:48:14Z","timestamp":1762876094030,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T00:00:00Z","timestamp":1562976000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T00:00:00Z","timestamp":1562976000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s12083-019-00785-5","type":"journal-article","created":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T07:02:37Z","timestamp":1563001357000},"page":"1156-1177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE\/LTE-A networks"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9903-1880","authenticated-orcid":false,"given":"Balu L.","family":"Parne","sequence":"first","affiliation":[]},{"given":"Shubham","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Narendra S.","family":"Chaudhari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,13]]},"reference":[{"key":"785_CR1","doi-asserted-by":"crossref","unstructured":"Jover RP (2015) Security and impact of the IoT on LTE mobile networks. In: Security and Privacy in the Internet of Things (IoT): Models, Algorithms, and Implementations, vol. 6, CRC Press","DOI":"10.1201\/b19516-26"},{"issue":"2","key":"785_CR2","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10796-014-9489-2","volume":"17","author":"A Whitmore","year":"2015","unstructured":"Whitmore A, Agarwal A, Da Xu L (2015) The internet of things a survey of topics and trends. Inf Syst Front 17(2):261\u2013274","journal-title":"Inf Syst Front"},{"issue":"1","key":"785_CR3","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s12083-016-0505-9","volume":"11","author":"J Kim","year":"2018","unstructured":"Kim J, Choi SC, Yun J, Lee J (2018) Towards the oneM2M standards for building IoT ecosystem: analysis, implementation and lessons. Peer-to-Peer Netw Appl 11(1):139\u2013151","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"2","key":"785_CR4","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/COMST.2014.2361626","volume":"17","author":"F Ghavimi","year":"2015","unstructured":"Ghavimi F, Chen H-H (2015) M2M communications in 3GPP LTE\/LTE-a networks: architectures, service requirements, challenges, and applications. IEEE Commun Surv Tutorials 17(2):525\u2013549","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"1","key":"785_CR5","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/SURV.2013.100713.00203","volume":"16","author":"J Kim","year":"2014","unstructured":"Kim J, Lee J, Kim J, Yun J (2014) M2M service platforms: survey, issues, and enabling technologies. IEEE Commun Surv Tutorials 16(1):61\u201376","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"6","key":"785_CR6","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1007\/s12083-017-0608-y","volume":"11","author":"Y Jang","year":"2017","unstructured":"Jang Y, Kim J, Lee W (2017) Development and application of internet of things educational tool based on peer to peer network. Peer-to-Peer Netw Appl 11(6):1217\u20131229","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"4","key":"785_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCOM.2014.6807945","volume":"52","author":"X Lin","year":"2014","unstructured":"Lin X, Andrews J, Ghosh A, Ratasuk R (2014) An overview of 3GPP device-to-device proximity services. IEEE Commun Mag 52(4):40\u201348","journal-title":"IEEE Commun Mag"},{"key":"785_CR8","unstructured":"3rd Generation Partnership Project(3GPP) (2014) Technical specification group services and system aspects; service requirements for machine-type communication (MTC); (release 13), 3GPP TS 22.368 V13.1.0"},{"issue":"3","key":"785_CR9","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/s00779-013-0674-y","volume":"18","author":"RC Park","year":"2014","unstructured":"Park RC, Jung H, Chung KY, Kim KJ (2014) Performance analysis of LTE downlink system using relay-based selective transmission. Pers Ubiquit Comput 18(3):543\u2013551","journal-title":"Pers Ubiquit Comput"},{"issue":"4","key":"785_CR10","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCOM.2014.6807948","volume":"52","author":"M Alam","year":"2014","unstructured":"Alam M, Yang D, Rodriguez J, Abd-alhameed R (2014) Secure device-to-device communication in LTE-a. IEEE Commun Mag 52(4):66\u201373","journal-title":"IEEE Commun Mag"},{"issue":"3","key":"785_CR11","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s12083-015-0396-1","volume":"9","author":"WS Bae","year":"2016","unstructured":"Bae WS (2016) Designing and verifying a P2P service security protocol in M2M environment. Peer-to-Peer Netw Appl 9(3):539\u2013545","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"1","key":"785_CR12","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/s12083-016-0477-9","volume":"11","author":"G Wang","year":"2018","unstructured":"Wang G, Liu T (2018) Resource allocation for M2M-enabled cellular network using Nash bargaining game theory. Peer-to-Peer Netw Appl 11(1):110\u2013123","journal-title":"Peer-to-Peer Netw Appl"},{"key":"785_CR13","unstructured":"Park Y, Park T (2007) A survey of security threats on 4G networks, Globecom Workshops, 2007. IEEE: 1\u20136"},{"key":"785_CR14","doi-asserted-by":"crossref","unstructured":"Aiash M, Mapp G, Lasebae A, Phan R (2010) Providing security in 4G systems: unveiling the challenges. In: Sixth advanced international conference on telecommunications (AICT). IEEE, pp 439\u2013444","DOI":"10.1109\/AICT.2010.24"},{"issue":"2","key":"785_CR15","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MSP.2012.136","volume":"11","author":"AN Bikos","year":"2013","unstructured":"Bikos AN, Sklavos N (2013) LTE\/SAE security issues on 4G wireless networks. IEEE Secur Priv 11(2):55\u201362","journal-title":"IEEE Secur Priv"},{"key":"785_CR16","doi-asserted-by":"crossref","unstructured":"Abdeljebbar M, Elkouch R (2016) Security analysis of LTE\/SAE networks over e-UTRAN. In: International conference on information technology for organizations development (IT4OD). IEEE, pp 1\u20135","DOI":"10.1109\/IT4OD.2016.7479296"},{"issue":"1","key":"785_CR17","first-page":"69","volume":"2","author":"M Purkhiabani","year":"2012","unstructured":"Purkhiabani M, Salahi A (2012) Enhanced authentication and key agreement procedure of next generation 3GPP mobile networks. Int J Inform Electronics Eng 2(1):69","journal-title":"Int J Inform Electronics Eng"},{"key":"785_CR18","unstructured":"Vintil\u0103 C-E, Patriciu V-V, Bica I (2011) Security analysis of LTE access network. In: Proc. 10th Intl Conf. Networks, pp 29\u201334"},{"issue":"5","key":"785_CR19","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1007\/s12083-017-0580-6","volume":"11","author":"J Zhang","year":"2018","unstructured":"Zhang J, Wang ZJ, Quan Z, Yin J, Chen Y, Guo M (2018) Optimizing power consumption of mobile devices for video streaming over 4G LTE networks. Peer-to-Peer Netw Appl 11(5):1101\u20131114","journal-title":"Peer-to-Peer Netw Appl"},{"key":"785_CR20","doi-asserted-by":"crossref","unstructured":"Deng Y, Fu H, Xie X, Zhou J, Zhang Y, Shi J (2009) A novel 3GPP SAE authentication and key agreement protocol. In: IEEE international conference on network infrastructure and digital content (ICNIDC 2009). IEEE, pp 557\u2013561","DOI":"10.1109\/ICNIDC.2009.5360865"},{"key":"785_CR21","doi-asserted-by":"crossref","unstructured":"Gu L, Gregory MA (2011) A green and secure authentication for the 4th generation mobile network. In: Australasian telecommunication networks and applications conference (ATNAC 2011). IEEE, pp 1\u20137","DOI":"10.1109\/ATNAC.2011.6096633"},{"key":"785_CR22","doi-asserted-by":"crossref","unstructured":"Hadiji F, Zarai F, Kamoun L (2009) Authentication protocol in fourth generation wireless networks. In: IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2009). IEEE, pp 1\u20134","DOI":"10.1109\/WOCN.2009.5010508"},{"key":"785_CR23","doi-asserted-by":"crossref","unstructured":"Hamandi K, Sarji I, Chehab A, Elhajj IH, Kayssi A (2013) Privacy enhanced and computationally efficient HSK-AKA LTE scheme. In: 27th International conference on advanced information networking and applications workshops (WAINA 2013). IEEE, pp 929\u2013934","DOI":"10.1109\/WAINA.2013.133"},{"key":"785_CR24","unstructured":"He D, Wang J, Zheng Y (2008) User authentication scheme based on self certified public-key for next generation wireless network. In: International symposium on biometrics and security technologies (ISBAST 2008). IEEE, pp 1\u20138"},{"key":"785_CR25","doi-asserted-by":"crossref","unstructured":"K\u00f8ien GM (2011) Mutual entity authentication for LTE. In: 7th International wireless communications and mobile computing conference (IWCMC 2011). IEEE, pp 689\u2013694","DOI":"10.1109\/IWCMC.2011.5982630"},{"key":"785_CR26","doi-asserted-by":"crossref","unstructured":"Li X, Wang Y (2011) Security enhanced authentication and key agreement protocol for LTE\/SAE network. In: 7th International conference on wireless communications, networking and mobile computing (WiCOM 2011). IEEE, pp 1\u20134","DOI":"10.1109\/wicom.2011.6040169"},{"key":"785_CR27","doi-asserted-by":"crossref","unstructured":"Zheng Y, He D, Tang X, Wang H (2005) AKA and authorization scheme for 4G mobile networks based on trusted mobile platform. In: Fifth international conference on information, communications and signal processing. IEEE, pp 976\u2013980","DOI":"10.1109\/ICICS.2005.1689196"},{"issue":"1","key":"785_CR28","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/SURV.2013.041513.00174","volume":"16","author":"J Cao","year":"2014","unstructured":"Cao J, Ma M, Li H, Zhang Y, Luo Z (2014) A survey on security aspects for LTE and LTE-a networks. IEEE Commun Surv Tutorials 16(1):283\u2013302","journal-title":"IEEE Commun Surv Tutorials"},{"key":"785_CR29","doi-asserted-by":"crossref","unstructured":"Peng C, Tu G-H, Li C-Y, Lu S (2012) Can we pay for what we get in 3G data access?. In: Proceedings of the 18th annual international conference on mobile computing and networking. ACM, pp 113\u2013124","DOI":"10.1145\/2348543.2348560"},{"key":"785_CR30","unstructured":"Vintil\u0103 C-E, Patriciu V-V, Bica I (2011) A J-PAKE based solution for secure authentication in a 4G network, NEHIPISIC\u201911 Proceeding of 10th WSEAS international conference on electronics, hardware, wireless and optical communications"},{"key":"785_CR31","doi-asserted-by":"crossref","unstructured":"Choudhury H, Roychoudhury B, Saikia DK (2012) Enhancing user identity privacy in LTE. In: 11th International conference on trust, security and privacy in computing and communications. IEEE, pp 949\u2013957","DOI":"10.1109\/TrustCom.2012.148"},{"issue":"47","key":"785_CR32","first-page":"2337","volume":"9","author":"M Prasad","year":"2015","unstructured":"Prasad M, Manoharan R (2015) A robust secure DS-AKA with mutual authentication for LTE-a. Appl Math Sci 9(47):2337\u20132349","journal-title":"Appl Math Sci"},{"key":"785_CR33","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.comcom.2016.09.009","volume":"98","author":"K Hamandi","year":"2017","unstructured":"Hamandi K, Abdo JB, Elhajj IH, Kayssi A, Chehab A (2017) A privacy-enhanced computationally-efficient and comprehensive LTE-AKA. Comput Commun 98:20\u201330","journal-title":"Comput Commun"},{"issue":"4","key":"785_CR34","first-page":"769","volume":"18","author":"M Ramadan","year":"2016","unstructured":"Ramadan M, Li F, Xu C, Mohamed A, Abdalla H, Ali AA (2016) User-to-user mutual authentication and key agreement scheme for LTE cellular system. IJ Netw Secur 18(4):769\u2013781","journal-title":"IJ Netw Secur"},{"key":"785_CR35","doi-asserted-by":"crossref","unstructured":"Baza MI, Fouda MM, Eldien AST, Mansour HA (2015) An efficient distributed approach for key management in microgrids. In: 11th International computer engineering conference (ICENCO-2015). IEEE, pp 19\u201324","DOI":"10.1109\/ICENCO.2015.7416320"},{"key":"785_CR36","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.comnet.2015.11.014","volume":"94","author":"FB Degefa","year":"2016","unstructured":"Degefa FB, Lee D, Kim J, Choi Y, Won D (2016) Performance and security enhanced authentication and key agreement protocol for SAE\/LTE network. Comput Netw 94:145\u2013163","journal-title":"Comput Netw"},{"issue":"4","key":"785_CR37","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/2981547","volume":"16","author":"N Saxena","year":"2016","unstructured":"Saxena N, Grijalva S, Chaudhari NS (2016) Authentication protocol for an IoT-enabled LTE network. ACM Trans Internet Technol (TOIT) 16(4):25","journal-title":"ACM Trans Internet Technol (TOIT)"},{"issue":"4","key":"785_CR38","doi-asserted-by":"publisher","first-page":"2834","DOI":"10.1109\/TSG.2016.2620939","volume":"9","author":"A Mohammadali","year":"2018","unstructured":"Mohammadali A, Haghighi MS, Tadayon MH, Mohammadi-Nodooshan A (2018) A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Trans Smart Grid 9(4):2834\u20132842","journal-title":"IEEE Trans Smart Grid"},{"key":"785_CR39","doi-asserted-by":"crossref","unstructured":"Sharma C, Vaid R (2019) Analysis of existing protocols in WSN based on key parameters. In: Proceedings of 2nd international conference on communication, computing and networking. Springer, Berlin, pp 165\u2013171","DOI":"10.1007\/978-981-13-1217-5_17"},{"issue":"2","key":"785_CR40","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.jss.2009.08.019","volume":"83","author":"H-H Ou","year":"2010","unstructured":"Ou H-H, Hwang M-S, Jan J-K (2010) A cocktail protocol with the authentication and key agreement on the umts. J Syst Softw 83(2):316\u2013325","journal-title":"J Syst Softw"},{"key":"785_CR41","doi-asserted-by":"crossref","unstructured":"Calhoun P, Loughney J, Guttman E, Zorn G, Arkko J (2003) Diameter base protocol, Technical report","DOI":"10.17487\/rfc3588"},{"key":"785_CR42","doi-asserted-by":"crossref","unstructured":"Fajardo V, Arkko J, Loughney J, Zorn G (2012) Diameter base protocol, Technical report","DOI":"10.17487\/rfc6733"},{"key":"785_CR43","doi-asserted-by":"crossref","unstructured":"Burrows M, Abadi M, Needham R (1989) A logic of authentication. In: Proceedings of the royal society of london a: mathematical, physical and engineering sciences, vol 426. The Royal Society, pp 233\u2013271","DOI":"10.1145\/74850.74852"},{"key":"785_CR44","unstructured":"Burrows M, Abadi M, Needham R (1988) Authentication: a practical study in belief and action. In: Proceedings of the 2nd conference on theoretical aspects of reasoning about knowledge. Morgan Kaufmann Publishers Inc., pp 325\u2013342"},{"key":"785_CR45","doi-asserted-by":"crossref","unstructured":"Gaarder K, Snekkenes E (1990) On the formal analysis of pkcs authentication protocols. In: Advances in Cryptology AUSCRYPT\u201990. Springer, pp 105\u2013121","DOI":"10.1007\/BFb0030355"},{"issue":"9","key":"785_CR46","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multiserver authentication protocol using smart cards. IEEE Trans Inform Forensics Secur 10(9):1953\u20131966","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"785_CR47","doi-asserted-by":"crossref","unstructured":"Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cu\u00e9llar J, Drielsma PH, H\u00e9am P-C, Kouchnarenko O, Mantovani J, et al (2005) The avispa tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification. Springer, pp 281\u2013285","DOI":"10.1007\/11513988_27"},{"key":"785_CR48","unstructured":"Avispa Automated Validation of Internet Security Protocols (2003) \n                    http:\/\/www.avispa-project.org"},{"issue":"3","key":"785_CR49","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1002\/ett.2635","volume":"26","author":"C Lai","year":"2015","unstructured":"Lai C, Li H, Li X, Cao J (2015) A novel group access authentication and key agreement protocol for machine-type communication. Trans Emerging Telecommun Technol 26(3):414\u2013431","journal-title":"Trans Emerging Telecommun Technol"},{"key":"785_CR50","doi-asserted-by":"crossref","unstructured":"Jiang R, Lai C, Luo J, Wang X, Wang H (2013) EAP-based group authentication and key agreement protocol for machine-type communications, Int J Distributed Sensor Netw","DOI":"10.1155\/2013\/304601"},{"issue":"17","key":"785_CR51","doi-asserted-by":"publisher","first-page":"3492","DOI":"10.1016\/j.comnet.2013.08.003","volume":"57","author":"C Lai","year":"2013","unstructured":"Lai C, Li H, Lu R, Shen XS (2013) SE-AKA: a secure and efficient group authentication and key agreement protocol for LTE networks. Comput Netw 57(17):3492\u20133510","journal-title":"Comput Netw"},{"key":"785_CR52","unstructured":"Michael S Multiprecision integer and rational arithmetic c\/c++ library (mir- acl). Available online at \n                    https:\/\/libraries.docs.miracl.com\/miracl-user-manual\/installation"},{"key":"785_CR53","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.adhoc.2018.07.030","volume":"84","author":"M Gupta","year":"2019","unstructured":"Gupta M, Chaudhari NS (2019) Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit. Ad Hoc Networks 84:56\u201367","journal-title":"Ad Hoc Networks"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00785-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-019-00785-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00785-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,11]],"date-time":"2020-07-11T23:32:56Z","timestamp":1594510376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-019-00785-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,13]]},"references-count":53,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["785"],"URL":"https:\/\/doi.org\/10.1007\/s12083-019-00785-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2019,7,13]]},"assertion":[{"value":"23 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}