Abstract
One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered one of the main foundations for the continued growth of Internet of Things connectivity and an important issue to be treated in the development of 5G networks. This article describes some protocols for the group-based authentication of devices/sensors in Internet of Things and presents a new group authentication protocol based on Shamir’s secret and Lagrange interpolation formula. The new protocol protects privacy, avoids unauthorized access to information, and assists in the prevention of attacks, as replay, distributed denial of service, and man-in-the-middle. A security analysis and comparisons among the 3GPP evolved packet system authentication and key agreement standard protocol and other recent group authentication protocols were performed toward proving the efficiency of the proposed protocol. The comparisons regard security properties and computational and communication costs. The safety of the protocol was formally verified through simulations conducted by automated validation of internet security protocols and applications.
Keywords
Introduction
The Internet of Things (IoT) has increased the production of daily-life devices and technological advances are leading to a type of communication defined as machine-type communication (MTC), in which at least one of the parties is a machine or sensor that requires no human intervention. MTC has been widely used for many applications related to IoT, among which the main ones are large-scale real-time applications, as
Security (e.g. surveillance, control of physical access, home security);
Tracking (e.g. fleet management, navigation, traffic information);
Driverless autonomous transportation systems;
Health (e.g. monitoring of vital signs, telemedicine, remote diagnoses);
Metering (e.g. electric power, gas, water, heating);
Remote maintenance/control (e.g. lighting, pumps, valves, vehicle diagnoses).
The MTC technology has been included as an important part of fifth-generation (5G) communications, based on a new radio technology able to treat massive machine-type communication (mMTC) and critical MTC (ultra reliable and low latency communication). Moreover, the addition of a MTC Server in the 3GPP architecture allows the development of applications in areas as health, transportation, environment, automation, and farming. MTC involves many categories of sensor-based applications, with billions of devices with small size data scattered worldwide and many signaling messages to be transmitted.
Support to such a massive number of MTC devices carries deep implications for the network architecture and its protocols. Among different options of access network for MTC, LTE/LTE-A (Long Term Evolution—Advanced) has been an important alternative for supporting MTC communications. It accommodates such a type of traffic, once it offers large coverage, high data rates, throughput, low latency, and mobility support. However, due to the provisioning of MTC services, a large signaling overload can occur in the network, which affects the provisioning of quality of service (QoS) for H2H (human-to-human) services.
The LTE/LTE-A radio area network is composed of mobile terminals, eNodeBs, and an LTE-A core network, named EPC (Evolved Packet Core), composed of components, such as HSS (Home Subscriber Server), MME (Mobile Management Entity), S-GW (Serving Gateway) and P-GW (Packet Data Network Gateway). In 3GPP, Releases 11, 12, and 13 of the LTE-A define the current and planned MTC features.
In an MTC architecture based on LTE/LTE-A, several MTC devices/sensors collect and send information to an MTC server, where it is analyzed. This MTC server, commonly located outside of the LTE-A network, stores the data collected by MTC devices; therefore, a new scenario involving the end-to-end connection among the MTCDs (mobile terminal communication devices), EPC, and MTC server must be treated.
Any communication in a public link can be a target for attacks, which highlights the importance of an efficient protection that imposes no inadequate bandwidth consumption (measured in number of bits sent over the communication channels). Computational resources must be carefully used and, since the process and resources involved in data collection and storage must be reliable, any decision-support process will depend on the confidence on the end-to-end network infrastructure.
This relevant scenario, based on the combination of MTCs complemented by a wireless wide area cellular network (LTE/LTE-A) and an MTC server, poses some security-related issues that must be adequately addressed. Below are some of such issues:
Support to a large number of MTC devices may cause signaling congestion, since the network may be overloaded with signaling from the authentication and control processes. Therefore, the repetition of costly authentication messages must be avoided.
An independent authentication process conducted by an MTD device will affect the radio access network (LTE) and the mobile core network (EPC) and cause high network access latency.
The number of bits sent on communication channels must be minimized, due to scarcity and the exponentially growing demand for voice and data traffic; moreover, cellular networks are commonly overloaded by H2H voice and data traffic.
An MTCD may show low processing capability and cause processing delays that might be incompatible with some applications of telemonitoring, tracking, and metering, for example. Therefore, the computational overhead imposed mainly to MTCDs must be reduced.
The current standardized AKA (Authentication and Key Agreement) protocol, known as EPS-AKA (Evolved Packet System Authentication and Key Agreement), 1 works in an individual basis and no group management scheme is provided. A full EPS-AKA 1 authentication procedure conducted for each MTCD imposes computational overhead and an authentication delay that hamper its practical use when a large number of devices requires authentication.
EPS-AKA 1 is vulnerable to several known attacks (e.g. man-in-the-middle (MITM) and denial of service (DoS)) and suffers from disclosure of user’s identity in the first access to the network.
Users and network infrastructure may suffer from other typical threats and attacks (e.g. network impersonation, redirection, and replay attacks), which require security-related countermeasures for protection of integrity of data and preservation of MTCDs privacy.
The literature reports some protocols that enable group authentication, avoid congestion, and address safety toward circumventing such problems. However, they involve some security issues and their performance requires improvements.
Our solution involves a security-robust protocol that shows high performance for MTC in LTE/LTE-A network for the circumvention of the above-stated problems. A new authentication and key agreement protocol for congestion avoidance and better security has been designed; it consumes less bandwidth and fewer computational resources than other recent proposals. It is characterized by a mutual authentication and key agreement protocol, based on devices grouping, according to criteria, as same application type, localization, same MTC server, among others. Instead of authenticating each device separately, the network authenticates all in the MTC group simultaneously, reducing the signaling traffic. A leader has specific tasks for each group, which reduces the bandwidth consumption.
The protocol for MTC groups is based on Shamir’s 2 secret and a binary tree group management, which guarantees security protection and improvements in the performance. It can also resist many attacks at low bandwidth consumption. It assumes a KGC (Key Generation Center) integrated with the HSS for avoiding the creation of a new component for key management. A session key is established between each MTCD and MME and two phases, namely registration (which uses asymmetric cryptography) and mutual authentication and key agreement (which uses symmetric cryptography) are considered.
The contributions of this article are as follows:
The proposal of a group authentication protocol to avoid the disadvantages of EPS-AKA 1 protocol (standardized by 3GPP) that authenticates each device independently, generating high computational and communication costs and security issues.
Computational cost reduction, due to the use of symmetric cryptography, when compared to group-based authentication and key agreement (GR-AKA), 3 also based on Shamir 2 and Harn, 4 and to other group authentication protocols as Lai et al. 5 and Choi et al. 6 Consequently, the main operations performed (hash, module, multiplication, and Lagrange component) have low cost, which reduces the processing time of the operations performed.
Communication cost reduction, due to the use of symmetric cryptography, when compared to the above-mentioned protocols. Causing a diminishing in the size of exchanged parameters during the authentication procedure. Basically, only identities and hash are sent. Moreover, the amount of parameters exchanged is reduced.
Protection against attacks, such as replay, DoS, MITM, redirection, and impersonation;
Assurance of security properties, such as confidentiality, integrity, anonymity, forward, and backward secrecy;
Formal validation of the protocol, using some Automated Validation of Internet Security Protocols and Applications (AVISPA)7,8 backends, and a graphic simulation tool, which provides the visualization messages exchanged with or without the presence of an intruder.
The remainder of the paper is organized as follows: section “Related work” addresses some related and relevant studies; section “Proposed protocol” presents the protocol, which involves a registration phase and mutual authentication and key agreement; section “Security analysis of the protocol” reports on some security analyses and comparisons to other protocols; section “Performance evaluation” describes the performance evaluation that considered computation and communication costs; finally, conclusions and suggestions for future works are provided in section “Conclusion.”
Related work
Security in group-based communication that considers sensor networks has been previously addressed, with proposals that lead to performance improvement.9–11 In this study, we consider an extended scenario, where sensors (MTCD’s), organized in groups, are connected to an MTC server by an LTE/LTE-A network for a broad range of applications, including e-health, smart metering, online school, and environment monitoring.
The development of group authentication has generated complex and robust protocols for MTC in LTE/LTE-A with higher security protection and better performance, which has brought innovations in the field.
A first contribution was provided by Harn, 4 who used Shamir’s 2 Secret Sharing Scheme, a scheme based on polynomial and Lagrange interpolating formula. The protocol enables a group manager to generate a secret token, based on random polynomial, for each member of a group, where all tokens have a secret value in common. Therefore, all members can authenticate each other, reconstructing the secret value through the Lagrange interpolating formula. Only if all of them are legitimate, that is, all have legitimate tokens, the right secret will be reconstructed. Despite being an efficient group authentication protocol, it was not designed to be used for MTC in LTE/LTE-A; therefore, it does not consider the network architecture, security properties, and the higher performance required by MTC development.
Li et al. 3 developed a group authentication protocol based on Shamir’s 2 secret and Harn’s 4 group authentication scheme, called GR-AKA. Its architecture is similar to that of 3GPP EPS-AKA 1 and the difference is the MTC Server can be located inside or outside the LTE architecture. Despite its key management efficiency, Li et al. 3 do not guarantee the anonymity of the MTC group and privacy in the device’s identities from other devices in the same group. The group’s identity is sent in plaintext and enables the attacker to track and identify the groups involved in the authentication procedure. The proposal uses asymmetric cryptography in the authentication phase, which requires higher consumption of computational resources in comparison to symmetric cryptography.
Lai et al. 5 proposed a protocol, called GLARM (group-based lightweight authentication scheme for resource constrained machine-to-machine communications), which is totally based on symmetric keys and hash functions and provides mutual and fast group authentication and key agreement. It consists of two phases, namely Initialization and Group Authentication and Key Agreement and its differential is the use of location area identification (LAI) of the base station involved in the authentication procedure to prevent attacks originated from intruder base stations. LAI identifies base stations in a unique way. The architecture is similar to that of 3GPP, as shown in Figure 1. Although it provides a fast group authentication, it requires high a consumption of communication resources, not desired in the development of MTC.

Network architecture of the proposed protocol.
The protocol designed by Choi et al. 6 is based on symmetric cryptography and manages a group of devices through a binary tree, where each node is associated with a secret value derived from its parents. The tree provides an efficient and secure structure for the management of groups of devices, enables each device to be authenticated simultaneously with the group leader, and establishes different session keys between the MME and each device. The session key is based on the secret values of the common tree nodes between each device and the MME and on a random number generated by the HSS in the authentication procedure. However, regarding security, the protocol does not guarantee the anonymity of the MTC group.
The protocol created by Fu et al. 12 (privacy-AKA) is a privacy-preserving group authentication protocol based on ECDH (elliptic-curve Diffie–Hellman) key agreement. It performs secure and efficient mutual authentication and key agreement among groups of devices and a MME (Mobility Management Entity). The work preserves the privacy and anonymity of the devices by defining a set of pseudo identities, consequently protecting their permanent identities. Privacy-AKA is composed of two phases, namely initialization and mutual authentication.
Lai et al. 13 developed a group authentication protocol based on ECDH to perform the mutual authentication among groups of devices and a MME. The authentication phase is divided in two parts, one to authenticate the first MTCD to arrive in the server network and another to authenticate the rest of devices in the group. In the first part, it is necessary to involve the HSS in the authentication. The second part just involves MTCDs and the MME. The scheme does not select a group leader. Consequently, the first device to arrive in the server network might not be able to perform the important task of representing its group if its resources are limited.
The scheme of Gupta et al. 14 proposes a dynamic group authentication and key agreement protocol for MTC in LTE/LTE-A (group-based secure authentication and key agreement (GBS-AKA)), based on symmetric cryptography composed of four phases. The group organization is based on binary tree and a group leader is elected. The protocol calculates temporary identities preserve the privacy of each MTC device. To maintain the forward and backward security, the group key is updated each time a device joins or leaves the group. GBS-AKA has proven to be secure against several attacks; nevertheless, it presents high communication cost.
Parne et al. 15 proposed security enhanced group based authentication and key agreement (SEGB-AKA), a protocol for M2M communication in an IoT-enabled LTE/LTE-A network. The protocol is divided in four phases and is based on symmetric cryptography. Unique key identifiers are used to preserve the privacy of devices. A group leader is selected based on characteristics as battery life, storage capacity, and communication capability. The group management is based on binary tree. However, although it provides efficient and secure mutual authentication, the proposed protocol presents high communication and computational costs.
Asymmetric cryptography frequently imposes a higher cost than symmetric cryptography. Such an aspect was considered in our proposal toward reducing computational costs. Table 1 shows comparisons among the protocols regarding structure and techniques.
Comparison of authentication protocols.
EPS-AKA: evolved packet system authentication and key agreement; MTC: machine-type communication; EPC: evolved packet core; LAI: location area identification.
Proposed protocol
This section presents a new group authentication protocol based on symmetric cryptography, Shamir’s secret sharing scheme and Lagrange’s interpolating formula, that aims at secure and efficient authentication and key agreement for large groups of devices with good performance of authentication protocols. The Dolev–Yao model is adopted as the basis for the attack (adversary) model.
The network architecture, shown in Figure 1, is derived from 3GPP 1 standards. The following basic assumptions related to the entities involved were considered:
KGC is a trustful authority integrated with the HSS;
The channel between MME and HSS is secure;
The MTC server is located outside the EPC.
The group organization and management of MTC devices are based on the use of a binary tree for a group, which facilitates the group management and control of members. 6
The protocol uses the Asynchronous (t; m; n) group authentication scheme (GAS) designed by Harn 4 to perform group authentication using Shamir’s 2 scheme. The (t, m, n) GAS guarantees group authentication for m devices of a group with n members and is resistant to (t – 1) compromised tokens. The values of m and n are the same, that is, all members in a group are authenticated. Harn’s scheme is suitable to our proposal because it quickly obtains one-time authentication for MTC group without the presence of a managing entity, as HSS.
Table 2 shows the main entities involved in the architecture of the protocol and the notations and corresponding definitions are provided in Table 3. The design and operation of the protocol is composed of two phases, namely registration and mutual authentication and key agreement.
Main entities involved in the architecture of the protocol.
Notations used in the protocol.
HSS: home subscriber server; KGC: key generation center; MME: mobile management entity.
Registration phase
The registration phase establishes and configures all parameters necessary for MTCD groups to be authenticated by the network. It is divided into subphases (a–e).
Group definition and leader election
This phase begins with an initialization procedure that considers a scenario with n MTCDs arranged into m groups, each group with n/m members. The MTCDs form a group based on common characteristics and a group leader is elected. Some of the device’s characteristics used for the group definition may be localization, type of application, and management by the same MTC server. The criteria used for the selection of the group leader may be higher storage capacity, longer battery, higher computational power, and higher communication capacity. The literature reports some processes for leader election, 16 which is outside the scope of this article. The phase occurs over a secure channel.
Creation of a binary tree
The HSS creates a binary tree, as described in Choi et al., 6 for organizing each MTC group registered in the network. An identifier IDMTCDi is assigned for each device and a set of temporary identifiers TIDMTCDi – j is obtained in the sequence. Each device is placed in an empty leaf and each node of the tree has a secret defined by HSS. The devices know all the secrets, except those that form a path between the device and the root of the tree. The HSS defines all nodes’ secrets and sends the tree to each member in the group with the secrets each one can know.
Generation of temporary identities of devices
HSS selects four hash functions
where
The devices store each
Generation of group identities
The HSS defines a group identity IDGi and temporary group identity TIDGi, generates a random number
Generation of tokens and secret S
Below is the description of the generation of k tokens and secret S to be used in the authentication phase. KGC chooses a random prime number
and secret S is
All coefficients
Finally, KGC calculates the hash of secret S, H(S), and hash function H() to be used in the verification of the validity of all devices in the group. It also publishes the following parameters: {p, GF(p), P, H(S), H(.), h1(.), h2(.), h3(.), h4(.)}. The registration phase procedure is summarized in Figure 2.

Registration phase. Letters b, c, d, and e indicate the respective subphase in which the message is exchanged.
Mutual authentication and key agreement phase
Once the registration phase has been successfully accomplished, the protocol proceeds as shown in Figure 3, with the following sequence.

Authentication and key agreement phase of the protocol.
Step 1.
Each device chooses a non-used
Step 2.
Each
Each MTCD uses
If H(S′) = H(S), all devices are validated and considered legitimate. If the verification fails, the group has one or more intruders and the process of authentication fails. The process continues only if all devices are legitimate and have been verified.
Step 3.
Step 4.
MME knows the LAI associated with the group and adds it to the message, so that HSS can verify if the LAI provided by the group leader is legit. MME stores each device’s
Step 5.
After receiving the message from MME, HSS associates the group temporary identity,
If
HSS chooses a random number
It then calculates a token for MME,
Finally, HSS sends
Step 6.
After receiving the message from HSS, MME generates a random number,
Step 7.
When each device has received the message from MME, they first update their Lagrange component with the MME’s identity,
Next, each device obtains
A new group temporary key is generated at each session. After updating the Lagrange component and calculating GTK, each MTCD recovers
Finally, the devices broadcast the new Lagrange component and the random number,
Step 8.
When each device has received all the new Lagrange components from other group members, they can authenticate the MME, recalculating secret S with the Lagrange component of MME
If S″ calculated is equal to S′ previously calculated, MME is authenticated by the devices and each of them sends it a success message. If the verification fails, each device that has detected an authentication failure sends MME a failure message.
When MME receives its Lagrange components,
If H(S′) is equal to H(S) published by KGC, the devices are authenticated by MME and it sends a success message to the
If the mutual authentication procedure is successful, MME integrates the binary tree as a new element. Each
where
Group secret and group key update
In our protocol, secret S and group key GK are important parameters, because the group authentication depends on them. A legitimate group will have a valid GK based on the members and must find the right S, with the components of each member, to obtain authentication. Therefore, the parameters must remain secret for the devices that do not integrate the current group. The scheme of secret update is based on Li et al. 3 and the group key update is based on Choi et al. 6
Members joining/leaving the group
When an MTCD joins or leaves the group, secret S and group key GK must be updated, so that the old member does not continue knowing the secret parameters and new members do not discover the last secret values of S and GK. Such an update process occurs whenever the group’s configuration has been altered.
Members joining
HSS creates a new leaf in the binary tree related to the new member and a new value secret,
where
When all devices (including MME) have received the new secret and decrypted it with the session key, they update their tokens to equation (21)
and group key GK to equation (25)
Members leaving
All members know the secret value of the node related to the member that has left the group
and secret S, as it occurs when a new member has joined the group.
The token each device has received from KGC is the result of a polynomial function f(x)
where the secret is a constant in the polynomial, f(0) =
Each member has the new secret and when the secret is recovered, the result is
Security analysis of the protocol
This section is devoted to the evaluation of the accomplishments of the protocol’s security properties and resistance to attacks.
Mutual authentication
HSS authenticates
MME authenticates all
Each
MITM attack
The channel between HSS and MME is secure; therefore, only the entity affected by an attacker may act between Shamir’s secret and Lagrange interpolating formula are used. The formula enables the construction of a Lagrange component based on the secret token. The recovery of the secret token from the Lagrange component is quite complex; the secret can be recovered only with valid Lagrange components. The group’s ID is secret; only TID is public. Only the one that knows the ID can generate or verify GK and GTK are used. As only The session key is used in the communication between the device and MME; only legitimate devices can obtain a session key.
Replay attack
Each authentication process is different from the previous ones, because new random values are generated to compose the messages. Therefore, the repetition of messages is almost impossible.
The parameters responsible for such a protection are as follows: Random values Use of temporary identities
Privacy (anonymity)
The privacy of the devices is protected by temporary identities (TID) against targeted attacks, so that an attacker does not know the real device’s identity.
Redirection attack
Each MTCD leader includes base station LAI in
Personification attack
Such an attack occurs when an attacker pretends it is a legitimate MTCD or MME.
MTCD ➔ HSS
An attacker cannot forge valid tokens
MTCD ➔ MME
An attacker cannot forge valid tokens
MME ➔ MTCD
Similarly, an attacker cannot forge a valid Lagrange component; therefore, when the MTCDs check
MTCD Intruder Group ➔ HSS
A set of attackers may pretend they are a registered MTC group in network; therefore, the attack will not succeed because only legitimate groups know a valid GK and can produce a valid S. HSS will recognize the attack by verifying
Although from the same group, an MTCD cannot pretend to impersonate another MTCD of its group, because a device does not know the secret tokens,
DoS attack
This attack occurs when an attacker tries to drop the server or network sending a large number of authentication messages until it stops working properly:
In our protocol, HSS receives the first message only when the members of the group have authenticated each other; therefore, all devices can detect the presence of attackers and stop the procedure, avoiding involving HSS in the authentication procedure.
An attacker might create many fake messages to interrupt the HSS service. In our scheme, the first message HSS receives contains
Backward secrecy and forward secrecy
The keys that guarantee backward secrecy (BS) and forward secrecy (FS) are GK, session key
In our protocol, when a device enters or leaves the group, GK is updated to perform BS and FS. In other words, if a device leaves, it cannot discover the future GK and if a device enters the group, it cannot discover the past GK.
When a device is added to the group, HSS broadcasts its secret node to all other devices and the new GK is generated
When a device leaves, each device updates its GK as follows
Our protocol guarantees strong backward secrecy (sBS) and forward secrecy (sFS) to GK, because although an attacker discovers the current GK, it cannot discover past and future GKs, once it does not know the secret value used in the formula. Even if it occasionally discovers the current GK and the secret values used for its generation, it will not compromise past or future GKs, because the values used in the calculation are renewed in each update. The same occurs with
If an attacker discovers the current value of the session key, it cannot associate it with past or future keys, because it does not know the secret values (even if it is a member’s group, it does not know its own secret value) and secret S and
Secret S must guarantee BS and FS; otherwise, each new or old member will know the secret of the group and can try to perform attacks with this information. Consequently, any modification in the group formation requires an update in secret S. The new secret is defined as
where
Comparison of security objectives among protocols.
EPS-AKA: evolved packet system authentication and key agreement; GLARM: group-based lightweight authentication scheme for resource constrained machine-to-machine; GR-AKA: group-based authentication and key agreement; FS/BS: forward secrecy/backward secrecy.
Performance evaluation
This section addresses the evaluation of the protocol performance and a comparison with the performance of some other protocols.1,3,5,6 All of them consider an MTC architecture with MTCD, MTC leader, MME, HSS, and MTC server and a safe channel between HSS and MME. They also have a registration/initialization phase that defines all parameters necessary for authentication and an authentication and key agreement phase that authenticates the MTCDs and establishes a session key between MTCD and MME.
Computational cost
The comparison of the computational cost of the protocol with the other schemes analyzed is here addressed. This cost is evaluated considering the processing time necessary to execute each operation necessary for the execution of protocols here considered. Table 5 shows the values of time cost for each operation, based on experimental evaluation by previous works,1,3,5,6 with some natural differentiation regarding the processing power of MTCD and the components of the EPC network (core network). The time spent on an XOR operation has been omitted, since it is negligible in comparison to the other operations.
Time costs in milliseconds of each operation considered.
MTCD: mobile terminal communication devices; AES: Advanced Encryption Standard.
The analysis considered computational costs related to MTCDs and the core network in separated parts, as shown in Table 6. An environment with n devices, divided into m groups, where all groups have n/m members, is considered. Each MTCD performs three hash operations (
Comparison of the computation costs among protocols.
MTCD: mobile terminal communication devices; EPS-AKA: evolved packet system authentication and key agreement; GLARM: group-based lightweight authentication scheme for resource constrained machine-to-machine; GR-AKA: group-based authentication and key agreement.
According to Table 6, the proposed protocol required the lowest computational cost and reached the best performance in comparison to the other protocols. For example, it performs only 0.55n + 0.54m operations in the authentication procedure, which is much fewer than 3.84n + 1.11m of GR-AKA. 3
Figures 4–7 show the computational costs of the five evaluated protocols as a function of number of devices for specific values of m (m = number of groups). According to the figures and the expressions in the rightmost column of Table 6, the increase in the communication cost is linear as a function of the number of devices (n).
Figure 4 shows the best performance of the proposed protocol in comparison to other protocols, even for a small number of groups (m = 2).

Comparison of computational costs, for m = 2.

Comparison of computational costs, for m = 10.

Comparison of computational costs, for m = 50.

Comparison of computational costs, for m = 100.
Figure 5 shows our protocol keeps the best performance in comparison to the other protocols if the number of devices increased to 10.
According to Figure 6, the proposed protocol achieves the best performance for 50 groups of devices.
Finally, Figure 7 shows the best performance achieved by our protocol when the number of groups is increased to m = 100, for n > 100. For n ≤ 100, the best protocol is EPS-AKA. 1 However, problems related to security of EPS-AKA 1 must be emphasized.
Communication cost
The communication cost was measured in bits according to the messages exchanged. The values adopted for each parameter transmitted are shown in Table 7. They were carefully chosen and based on the values used in previous works.1,3,5,6 An environment with n devices, divided into m groups, where each group n/m members was considered. The calculations were based on the number of messages, with their respective parameters exchanged in each message, that is, each parameter sent through the channel. Taking message 5 as an example, HSS sends
Communication cost of each parameter transmitted.
ID/TID: Identification/Temporary Identification; ECDH: Elliptic Curve - Diffie Hellman; MAC: Message Authentication Code; LC: Lagrange Component; LAI: Location Area Identification.
Communication cost in bits per message.
EPS-AKA: evolved packet system authentication and key agreement; GLARM: group-based lightweight authentication scheme for resource constrained machine-to-machine; GR-AKA: group-based authentication and key agreement.
According to Table 8, the proposed protocol required the lowest communication cost in comparison to the other protocols analyzed, once it sends a reduced number of bits, depending on the number of devices n. For example, it requires only 640n + 1320m bits of message to perform an authentication procedure. This is a reduced number, in comparison to GR-AKA, 3 which demands 1108n + 996m bits. Figure 7 also shows the comparison and the good performance of the protocol.
Figures 8–11 show the communication costs of the five evaluated protocols as a function of number of devices, for specific values of m. According to the figures and the expressions in the rightmost column of Table 8, the increase in the communication cost is linear as a function of number of devices (n).

Comparison of communication costs, for m = 2.

Comparison of communication costs, for m = 10.

Comparison of communication costs, for m = 50.

Comparison of communication costs, for m = 100.
Figure 8 shows a comparison of the communication cost of the protocols for two groups of devices. Our protocol clearly achieves the best performance for a small number of groups, as the number of devices increases.
According to Figure 9, if the number of groups is increased to 10, our protocol still shows the best communication costs, as the number of devices increases.
Figure 10 shows if the number of groups is increased to 50, our protocol still has the best communication cost, as the number of devices increases, for n ≥ 37. For n
Finally, according to Figure 11, if the number of groups is increased to 100, the proposed protocol shows, in most cases, the best performance, as the number of devices increases, in comparison to previous works.3,5,6 It has confirmed the expected results of the calculations shown in Table 8.
In a summarized way, the graphs in Figures 8–11 confirmed the lowest communication costs of the proposed protocols for almost all values of m, as the number of devices (n) increases. Figures 8 and 9 show the protocol has the best overall performance with groups with 2 or 10 devices. Figures 12 and 13 display three-dimensional representations of computational and communication costs, respectively, for providing a global view of the proposed protocol’s performance.
Figure 12 shows how the proposed protocol has the lowest computational cost while number of devices (n) and number of groups (m) increase separately or while both n and m increase.

Comparison of computational costs: (a) CHOI, 6 (b) EPS-AKA, (c) GLARM, (d) GR-AKA, and (e) proposed protocol.

Comparison of communication costs: (a) CHOI, 6 (b) EPS-AKA, (c) GLARM, (d) GR-AKA, and (e) proposed protocol.
Figure 13 provides a three-dimensional view of the communication costs for emphasizing the lowest cost required by the proposed protocol and its best performance in comparison to the other protocols, as the number of devices (n) and groups (m) rises.
Formal verification of the proposed protocol
This section addresses a formal verification of the protocol’s security properties conducted by AVISPA,7,8 a tool widely used for Internet security assessments. It employs HLPSL (High-Level Protocol Specification Language), which describes the exchange of messages necessary for the operation of the protocol, as well as the behavior of each entity for simulating the functioning of the protocol.
In HLPSL, each entity plays a role. In the proposed protocol, each MTCD performs an authentication procedure. Two MTCDs, namely MTCDleader and an ordinary MTCDij, were assumed in the verification procedure. Therefore, the roles implemented were those of an ordinary MTCDij, MTCDleader, MME, and HSS. Figure 14 describes the role of MTCDij. Transitions from a state to another occur simultaneously with the exchange of messages. The verification is performed in eight states. When State = 1, MTCDij sends the other devices (MTCDleader, in this verification) its

Role of each MTCD in HLPSL.
Figure 15 shows the security goals, which must be accomplished by the proposed protocol, including mutual authentication between MTCD (auth_1) and MME (auth_2) and secrecy of important parameters between different entities, as group temporary key, device’s random number, permanent identities, and session key.

Security goals established in HLPSL.
Results of security verification
Two security simulations based on On-the-fly Model-Checker (OFMC) 17 and Constraint-Logic-based Attack Searcher (CL-AtSe) 8 were conducted. The results show that the proposed protocol is considered safe by both checker mechanisms for the goals specified (Figures 16 and 17). CLAtSe 8 results show all eight states were reached.

Security simulation results for CLAtSe.

Security simulation results for OFMC.
AVISPA7,8 also comprehends a graphic simulation tool, SPAN (security protocol animator for AVISPA), 18 which enables a better visualization of exchanged messages and the participation of the intruder during the protocol. The graphical animations of our protocol are shown in Figure 18, and Figure 19 displays the simulation of an intruder’s action. In the scenario adopted, an intruder might completely control the network, that is, intercept, analyze, and modify the messages.

Protocol’s message exchange in SPAN. 18

Intruder’s simulation in SPAN. 18
Conclusion
Authentication represents a critical issue regarding the widespread adoption of the IoT paradigm and the development of 5G networks. A large number of sensors are expected to provide massive streams of real-time and non-real-time data to support decision-making processes, in a large number of applications and scenarios, as e-Health/m-Health, smart grids, smart homes, and public transportation.
In IoT, the traffic produced by an extensive number of devices/sensors is expected to trigger congestion in signaling networks, resulting from the overloading of links, processors, and memory resources. Moreover, in such technology, sensors with similar characteristics and management are commonly found. Therefore, organizing devices in groups is a natural choice to reduce some bottlenecks regarding computing and communication infrastructures necessary for IoT implementation.
The MTC technology might assist IoT applications by including a MTC server in the 3GPP architecture to provide management of the data collected. In addition, MTC enables MTC users the ability to remotely control collected data, such as a physician monitoring patients’ vital signs in e-Health/m-health or a farmer monitoring variables as humidity, sun light, and temperature in intelligent agriculture, for example.
Among the authentication protocols considered, the inadequacy of the standardized protocol (EPS-AKA) 1 to deal with groups of terminals/sensors was initially observed. After a literature review, this work proposed a group authentication and key agreement protocol, able to support to a large number of MTC devices; it is based on symmetric cryptography, secret sharing, and Lagrange interpolation and compared it with four other protocols.
The comparison was initially based on security properties and security objectives discussed and evaluated, according to several possible threats and attacks (e.g. confidentiality, integrity, resistance to replay and DoS attacks, resistance to MITM, redirection, and impersonation attacks). The protocol has proven resistant to the threats and attacks considered.
A performance analysis of the computational and communication costs of five protocols was conducted. The computational costs were evaluated according to the number of bits each protocol required in its operations, whereas the communication costs were measured in bits according to the messages exchanged.
The whole set of messages dealt with by each protocol and the respective number of bits were considered in the evaluation of the communication costs. Figures of performance in two and three dimensions showed the proposed protocol outperformed the other four protocols in most scenarios and situations.
Ongoing studies involve the formal validation of the protocol and future work aims at adapting it to smart city environments and some of their specific verticals/sectors (e-Health, smart grids, etc.).
Footnotes
Handling Editor: Michele Amoretti
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) received no financial support for the research, authorship, and/or publication of this article.
