The Internet of Things (IoT) is a new concept that is developed considerably in current wireless communications. The main idea of this paradigm is the exchange of information and data from real-world devices with the internet by using unique addressing systems can communicate and interact with each other to achieve common objectives. With the emergence of next generation battery-powered of smart mobile phone, open source application platforms, security and the terminal's energy consumption have become big issues. Long Term Evolution (LTE) is one of the most popular 4th Generation (4G) technologies defined by 3rd Generation Partnership Projects (3GPP) also IP Multimedia Subsystem (IMS) is a prominent architectural framework for multimedia services delivery in 4G/5G networks. In this paper, we focus on IoT security in particular, we explore authentication that is a critical security mechanism which accords authorized users access to a network. It is observed that the end user requires two authentication steps to access multimedia services. The first is the LTE network layer authentication, and the second is the IMS service layer authentication. The authentication steps utilize energy and are carried out using the Authentication and Key Agreement (AKA) protocol. As defined by 3GPP, IMS-Authentication and Key Agreement protocol (IMS-AKA) is the official authentication procedure in IMS and the standard EPS-Authentication and Key Agreement protocol (EPS-AKA) is proposed to provide the authentication service between the device and the network in Evolved Packet System (EPS) system. However, the procedures are prone to different weaknesses both on security and performances aspects. This paper proposes a secure and efficient AKA protocol that authenticates the user on both the network layer and the service layer without double execution the AKA protocol, simplifies the authentication steps, protects user's identities and reduces the authentication process complexity due to the use of Elliptic Curve Cryptography (ECC). The proposed solution was checked by the security protocol verification tool, Automated Validation of Internet Security Protocols and Applications (AVISPA), which indicated that it is a very secure level. Simulation results showed that our proposed compared to IMS-AKA and EPS-AKA offers better performances in terms of energy consumption and storage cost.