I. Introduction
With the aid of constantly crafted and revised security mechanisms in the telecommunication system, the end-to-end data communications between a cellular subscriber and mobile application server are protected and reliable, which introduces tremendous popularity of mobile devices and users. In particular, Authentication and Key Agreement (AKA) protocol in Long Term Evolution (LTE) provides mutual authentication between the user and the network as well as assigns symmetric keys to both sides for the confidentiality and integrity of their following communications [1].