JOURNAL ARTICLE

Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks

Yingying YaoXiaolin ChangJelena MišićVojislav B. Mišić

Year: 2020 Journal:   IEEE Transactions on Cognitive Communications and Networking Vol: 6 (2)Pages: 597-606   Publisher: Institute of Electrical and Electronics Engineers

Abstract

Ultra-dense networks (UDN) are considered as one of the key technologies for advancing the widespread deployment of 5G networks. To provide continuous and reliable connectivity to user devices and to achieve the integrity and authenticity of communication, UDN needs to address the challenges related to authentication and authorization of information. Existing authentication and key agreement (AKA) schemes are not appropriate for the ultra-dense deployment of access points due to excessive authentication and/or computation overhead. This paper proposes a novel lightweight batch authentication and key agreement (LBAKA) scheme for user-centric UDN scenarios by adopting lightweight batch authentication solution and one-to-one key agreement, and by using mutual authentication to verify the credibility of both sides of the communication. The proposed LBAKA can maintain privacy of identity information under replay, impersonation and man-in-the-middle attacks in user-centric UDNs. In terms of computation and communication overhead, our simulation results show that LBAKA outperforms other similar schemes in user-centric UDNs.

Keywords:
Computer science Authentication (law) Overhead (engineering) Computer network Key (lock) Secure communication Software deployment Authentication protocol Generic Bootstrapping Architecture Mutual authentication Computer security Data Authentication Algorithm Encryption

Metrics

12
Cited By
1.70
FWCI (Field Weighted Citation Impact)
39
Refs
0.84
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
Wireless Communication Security Techniques
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
© 2026 ScienceGate Book Chapters — All rights reserved.