{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:20:16Z","timestamp":1761402016967},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T00:00:00Z","timestamp":1550880000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s12652-019-01248-8","type":"journal-article","created":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T10:42:01Z","timestamp":1550918521000},"page":"2163-2185","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["An improved authentication and security scheme for LTE\/LTE-A networks"],"prefix":"10.1007","volume":"11","author":[{"given":"Prabhat Kumar","family":"Panda","sequence":"first","affiliation":[]},{"given":"Sudipta","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,23]]},"reference":[{"issue":"4","key":"1248_CR1","first-page":"636","volume":"20","author":"M Abdeljebbar","year":"2018","unstructured":"Abdeljebbar M, Kouch RE (2018) Security improvements of EPS-AKA Protocol. Inter J Netw Secur 20(4):636\u2013644","journal-title":"Inter J Netw Secur"},{"key":"1248_CR2","doi-asserted-by":"crossref","unstructured":"Abdrabou MA, Elbayoumy ADE, Wanis EAE (2015) LTE authentication protocol (EPS-AKA) weaknesses solution. In: Proceedings of the Seventh IEEE international conference on intelligent computing and information systems, pp 434\u2013441","DOI":"10.1109\/IntelCIS.2015.7397256"},{"key":"1248_CR3","doi-asserted-by":"crossref","unstructured":"Afdhila D, Nasution SM, Azmi F (2016) Implementation of stream cipher salsa20 algorithm to secure voice on push to talk application. In: Proceedings of the IEEE Asia pacific conference on wireless and mobile, pp 137\u2013141","DOI":"10.1109\/APWiMob.2016.7811443"},{"key":"1248_CR4","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.phycom.2010.08.001","volume":"3","author":"IF Akyildiz","year":"2010","unstructured":"Akyildiz IF, David M, Estevez G, Reyes EC (2010) The evolution to 4G cellular systems: LTE-advanced. Phys Commun 3:217\u2013244","journal-title":"Phys Commun"},{"key":"1248_CR5","doi-asserted-by":"crossref","unstructured":"Alezabi KA, Hashim F, Hashim SJ, Ali BM (2014) An efficient authentication and key agreement protocol for 4G (LTE) networks. In: Proceedings of the IEEE region 10 symposium, pp 502\u2013507","DOI":"10.1109\/TENCONSpring.2014.6863085"},{"issue":"57","key":"1248_CR6","first-page":"1","volume":"800","author":"E Barker","year":"2016","unstructured":"Barker E (2016) Recommendation for key management part 1: General (revision 4). NIST Spec Publ 800(57):1\u2013147","journal-title":"NIST Spec Publ"},{"key":"1248_CR7","unstructured":"Bernstein DJ (2005) Snuffle 2005: the Salsa20 encryption function.\u00a0\nhttp:\/\/cr.yp.to\/snuffle.html#xsalsa"},{"key":"1248_CR8","doi-asserted-by":"crossref","unstructured":"Bernstein DJ (2008) The Salsa20 family of stream ciphers. In: LNCS 4986, Springer, pp 84\u201397","DOI":"10.1007\/978-3-540-68351-3_8"},{"issue":"8","key":"1248_CR9","doi-asserted-by":"publisher","first-page":"2119","DOI":"10.1016\/j.comnet.2012.02.012","volume":"56","author":"J Cao","year":"2012","unstructured":"Cao J, Li H, Ma M, Zhang Y, Lai C (2012) A simple and robust handover authentication between henb and enb in LTE networks. Comput Netw 56(8):2119\u20132131","journal-title":"Comput Netw"},{"key":"1248_CR10","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/SURV.2013.041513.00174","volume":"16","author":"J Cao","year":"2014","unstructured":"Cao J, Ma M, Li H, Zhang Y, Luo Z (2014) A survey on security aspects for LTE and LTE-A networks. IEEE Commun Surv Tutorial 16:283\u2013302","journal-title":"IEEE Commun Surv Tutorial"},{"key":"1248_CR11","first-page":"116","volume":"55","author":"C Cheng","year":"2017","unstructured":"Cheng C, Lu R, Petzoldt A, Takagi T (2017) Securing the internet of things in a quantum world. IEEE Commun Mag 55:116\u2013120","journal-title":"IEEE Commun Mag"},{"key":"1248_CR12","doi-asserted-by":"publisher","first-page":"e3381","DOI":"10.1002\/dac.3381","volume":"31","author":"H-Y Chien","year":"2018","unstructured":"Chien H-Y (2018) An effective approach to solving large communication overhead issue and strengthening the securities of AKA protocols. Int J Commun Syst 31:e3381","journal-title":"Int J Commun Syst"},{"issue":"6","key":"1248_CR13","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1016\/j.csi.2007.01.004","volume":"29","author":"YF Chung","year":"2007","unstructured":"Chung YF, Huang KH, Lai F, Chen TS (2007) ID-based digital signature scheme on the elliptic curve cryptosystem. Comput Stand Interfaces 29(6):601\u2013604","journal-title":"Comput Stand Interfaces"},{"issue":"1","key":"1248_CR14","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.comnet.2015.11.014","volume":"94","author":"FB Degefa","year":"2016","unstructured":"Degefa FB, Lee D, Kim J, Choi Y, Won D (2016) Performance and security enhanced authentication and key agreement protocol for SAE\/LTE network. Comput Netw 94(1):145\u2013163","journal-title":"Comput Netw"},{"key":"1248_CR15","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal T (1985) A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31:469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"key":"1248_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.jnca.2017.10.017","volume":"101","author":"MA Ferrag","year":"2018","unstructured":"Ferrag MA, Maglaras L, Argyriou A, Kosmanos D, Janicke H (2018) Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J Netw Comput Appl 101:55\u201382","journal-title":"J Netw Comput Appl"},{"key":"1248_CR17","doi-asserted-by":"publisher","first-page":"2867","DOI":"10.1007\/s11277-017-5005-6","volume":"98","author":"S Gupta","year":"2018","unstructured":"Gupta S, Parne BL, Chaudhari NS (2018) DGBES: Dynamic Group Based Efficient and Secure authentication and key agreement protocol for MTC in LTE\/LTE-A networks. Wirel Pers Commun 98:2867\u20132899","journal-title":"Wirel Pers Commun"},{"key":"1248_CR18","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.comcom.2016.09.009","volume":"98","author":"K Hamandi","year":"2017","unstructured":"Hamandi K, Abdo JB, Elhajj IH, Kayssi A, Chehab A (2017) A privacy-enhanced computationally-efficient and comprehensive LTE-AKA. Comput Commun 98:20\u201330","journal-title":"Comput Commun"},{"key":"1248_CR19","volume-title":"Guide to elliptic curve cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson D, Menezes A, Vanstone S (2004) Guide to elliptic curve cryptography. Springer-Verlag, New York"},{"issue":"7","key":"1248_CR20","first-page":"826","volume":"5","author":"M Hou","year":"2010","unstructured":"Hou M, Xu Q, Shanqing G, Jiang H (2010) Cryptanalysis of identity-based authenticated key agreement protocols from parings. J Netw 5(7):826\u2013855","journal-title":"J Netw"},{"issue":"5","key":"1248_CR21","first-page":"1459","volume":"58","author":"YL Huang","year":"2012","unstructured":"Huang YL, Leu FY, Wei KC (2012) A secure communication over wireless environments by using a data connection core. Math Comput Model 58(5):1459\u20131474","journal-title":"Math Comput Model"},{"key":"1248_CR22","doi-asserted-by":"crossref","unstructured":"Huang YL, Leu FY, Liu JC, Lo LJ, Chu WCC (2013) A secure wireless communication system integrating PRNG and Diffie-Hellman PKDS by using a Data Connection Core. In: Proceedings of the IEEE International conference on broadband wireless computing, communication and applications, pp 360- 365","DOI":"10.1109\/BWCCA.2013.63"},{"issue":"3","key":"1248_CR23","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s11227-013-0958-z","volume":"67","author":"YL Huang","year":"2014","unstructured":"Huang YL, Leu FY, You I, Sun YK, Chu CC (2014) A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a data connection core in a 4G environment. J Supercomput 67(3):635\u2013652","journal-title":"J Supercomput"},{"issue":"4","key":"1248_CR24","first-page":"823","volume":"E85-B","author":"JJ Hwang","year":"2002","unstructured":"Hwang JJ, Yeh TC (2002) Improvement on Peyravian\u2013Zunic\u2019s password authentication schemes. IEICE Trans Commun E85-B(4):823\u2013825","journal-title":"IEICE Trans Commun"},{"issue":"11\u201312","key":"1248_CR25","doi-asserted-by":"publisher","first-page":"2703","DOI":"10.1016\/j.mcm.2011.07.001","volume":"57","author":"SKH Islam","year":"2013","unstructured":"Islam SKH, Biswas GP (2013) Design of improved password authentication and update scheme based on elliptic curve cryptography. Math Comput Model 57(11\u201312):2703\u20132717","journal-title":"Math Comput Model"},{"key":"1248_CR26","unstructured":"Jablon D (2013) The SPEKE Password-based key agreement methods. IETF draftjablon-speke-02.txt"},{"key":"1248_CR27","doi-asserted-by":"crossref","unstructured":"Kanani PI, Kaue V, Shah K (2014) Hybrid PKDS in 4G using secured DCC. In: Proceedings of the IEEE international conference on signal propagation and computer technology, pp 1-6","DOI":"10.1109\/ICSPCT.2014.6884983"},{"key":"1248_CR28","doi-asserted-by":"crossref","unstructured":"K\u00f8ien GM (2011) Mutual entity authentication for LTE. In: Proceedings of the 7th IEEE international conference on wireless communications and mobile computing conference, pp 689\u2013694","DOI":"10.1109\/IWCMC.2011.5982630"},{"key":"1248_CR29","doi-asserted-by":"crossref","unstructured":"Kumari KA, Sadasivam GS, Gowri SS, Akash SA, Radhika EG (2018) An approach for End-to-End (E2E) security of 5G applications. In: Proceedings of the 4th IEEE international conference on big data security on cloud, pp 133\u2013138","DOI":"10.1109\/BDS\/HPSC\/IDS18.2018.00038"},{"issue":"17","key":"1248_CR30","doi-asserted-by":"publisher","first-page":"3492","DOI":"10.1016\/j.comnet.2013.08.003","volume":"57","author":"C Lai","year":"2013","unstructured":"Lai C, Li H, Lu R, Shen XS (2013) SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Comput Netw 57(17):3492\u20133510","journal-title":"Comput Netw"},{"issue":"1","key":"1248_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1049\/iet-ifs.2012.0058","volume":"7","author":"C-T Li","year":"2013","unstructured":"Li C-T (2013) A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf Secur 7(1):3\u201310","journal-title":"IET Inf Secur"},{"issue":"1","key":"1248_CR32","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/S0167-4048(03)00114-7","volume":"22","author":"CL Lin","year":"2003","unstructured":"Lin CL, Hwang T (2003) A password authentication scheme with secure password updating. Comput Secur 22(1):68\u201372","journal-title":"Comput Secur"},{"key":"1248_CR33","unstructured":"Mahto D, Khan DA, Yadav DK (2016) Security analysis of elliptic curve cryptography and RSA. In: The world congress on engineering, pp 1-4"},{"key":"1248_CR34","doi-asserted-by":"publisher","first-page":"8459","DOI":"10.1109\/ACCESS.2018.2808324","volume":"6","author":"A Musaddiq","year":"2018","unstructured":"Musaddiq A, Zikria YB, Hahm O, Yu H, Bashir AK, Kim SW (2018) A survey on resource management in IoT operating systems. IEEE Access 6:8459\u20138482","journal-title":"IEEE Access"},{"issue":"3","key":"1248_CR35","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/JSAC.2018.2815418","volume":"36","author":"J Ni","year":"2018","unstructured":"Ni J, Lin X, Shen XS (2018) Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J Sel Areas Commun 36(3):644\u2013657","journal-title":"IEEE J Sel Areas Commun"},{"key":"1248_CR36","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.csi.2018.06.002","volume":"61","author":"PK Panda","year":"2019","unstructured":"Panda PK, Chattopadhyay S (2019) A modified PKM environment for the security enhancement of IEEE 802.16e. Comput Stand Interfaces 61:107\u2013120","journal-title":"Comput Stand Interfaces"},{"key":"1248_CR37","doi-asserted-by":"publisher","first-page":"3668","DOI":"10.1109\/ACCESS.2017.2788919","volume":"6","author":"BL Parne","year":"2018","unstructured":"Parne BL, Gupta S, Chaudhari NS (2018) SEGB: security enhanced group based AKA protocol for M2\u00a0M communication in an IoT enabled LTE\/LTE-A network. IEEE Access 6:3668\u20133684","journal-title":"IEEE Access"},{"issue":"5","key":"1248_CR38","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1016\/S0167-4048(00)05032-X","volume":"19","author":"M Peyravian","year":"2000","unstructured":"Peyravian M, Zunic N (2000) Methods for protecting password transmission. Comput Secur 19(5):466\u2013469","journal-title":"Comput Secur"},{"key":"1248_CR39","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1007\/s11277-015-2551-7","volume":"84","author":"N Saxena","year":"2015","unstructured":"Saxena N, Thomas J, Chaudhari NS (2015) ES-AKA: an efficient and secure authentication and key agreement protocol for UMTS networks. Wirel Pers Commun 84:1981\u20132012","journal-title":"Wirel Pers Commun"},{"key":"1248_CR40","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/s12046-018-0891-1","volume":"43","author":"G Singh","year":"2018","unstructured":"Singh G, Shrimankar D (2018) A privacy preserving authentication protocol with secure handovers for the LTE\/LTE-A networks. Sadhana 43:128. \nhttps:\/\/doi.org\/10.1007\/s12046-018-0891-1","journal-title":"Sadhana"},{"issue":"9","key":"1248_CR41","first-page":"11","volume":"9","author":"R Soram","year":"2009","unstructured":"Soram R, Khomdram M (2009) Juxtaposition of RSA and elliptic curve cryptosystem. Int J Comput Sci Netw Secur 9(9):11\u201321","journal-title":"Int J Comput Sci Netw Secur"},{"key":"1248_CR42","unstructured":"Xiehua L, Yongjun W (2011) Security enhanced authentication and key agreement protocol for LTE\/SAE network. In: Proceedings of the 7th IEEE international conference on wireless communications, networking and mobile computing (WiCOM), pp 1\u20134"},{"issue":"2","key":"1248_CR43","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1002\/sec.977","volume":"8","author":"L Xu","year":"2015","unstructured":"Xu L, Wu F (2015) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secure Commun Netw 8(2):245\u2013260","journal-title":"Secure Commun Netw"},{"key":"1248_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0710-x","author":"D Xu","year":"2018","unstructured":"Xu D, Chen J, Liu Q (2018) Provably secure anonymous three-factor authentication scheme for multi-server environments. J Ambient Intell Hum Comput. \nhttps:\/\/doi.org\/10.1007\/s12652-018-0710-x","journal-title":"J Ambient Intell Hum Comput."},{"key":"1248_CR45","unstructured":"Zhu L, Yu S, Zhang X (2008) Improvement up on mutual password authentication scheme. In: Proceedings of the IEEE international seminar on business and information management, pp 400\u2013403"},{"key":"1248_CR46","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1016\/j.future.2018.07.058","volume":"88","author":"YB Zikira","year":"2018","unstructured":"Zikira YB, Yu H, Afzal MK, Rehmani MH, Hahm O (2018a) Internet of things (IoT): Operating system, applications and protocols design and validation techniques. Future Gener Comput Syst 88:699\u2013706","journal-title":"Future Gener Comput Syst"},{"key":"1248_CR47","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.future.2017.12.045","volume":"82","author":"YB Zikira","year":"2018","unstructured":"Zikira YB, Afzal MK, Ishmanov F, Kim SW, Yu H (2018b) A survey on routing protocols supported by the contiki Internet of Things operating system. Future Gener Comput Syst 82:200\u2013219","journal-title":"Future Gener Comput Syst"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01248-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01248-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01248-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T04:00:24Z","timestamp":1587787224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01248-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,23]]},"references-count":47,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["1248"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01248-8","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,23]]},"assertion":[{"value":"17 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}