Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme

被引:4
|
作者
Mathi, Senthilkumar [1 ]
Dharuman, Lavanya [1 ]
机构
[1] Amrita Univ, Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Coimbatore, Tamil Nadu, India
来源
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016 | 2016年 / 89卷
关键词
Authentication; Confidentiality; Desynchronization; Long Term Evolution; Session Key; SECURITY;
D O I
10.1016/j.procs.2016.06.033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The core objective of 3GPP Long Term Evolution (LTE) is to provide a secured communication and high data rate for 4G users. Even though 4G network provides security, there are loopholes which lead to several attacks in 4G network. One such attack is desynchronization attack in 3GPP handover key management. This paper deliberates the vulnerability of desynchronization attack that occurs when source acts as rogue base station in 3GPP. In addition, it discusses how this attack jeopardizes the communication in 4G network and subsequently proposes a new scheme to overcome this attack. In the proposed scheme, the target generates its own key rather than using the key generated by source node for future communication with target to achieve a secure communication between the source and target base station in 4G LTE. The proposed scheme is simulated using network simulator 3 (NS-3). The numerical analysis shows that the proposed scheme achieves a significant reduction in the communication cost for key generation and authentication in LTE. (C) 2016 Published by Elsevier B.V.
引用
收藏
页码:170 / 179
页数:10
相关论文
共 50 条
  • [1] Fast Authentication during Handover in 4G LTE/SAE Networks
    Abdeljebbar, Mourad
    El Kouch, Rachid
    INTERNATIONAL CONFERENCE ON FUTURE INFORMATION ENGINEERING (FIE 2014), 2014, 10 : 11 - 18
  • [2] An Efficient Authentication and Key Agreement Protocol for 4G (LTE) Networks
    Alezabi, Kamal Ali
    Hashim, Fazirulhisyam
    Hashim, Shaiful Jahari
    Ali, Borhanuddin M.
    2014 IEEE REGION 10 SYMPOSIUM, 2014, : 502 - 507
  • [3] A ROBUST 4G/LTE NETWORK AUTHENTICATION FOR REALIZATION OF FLEXIBLE AND ROBUST SECURITY SCHEME
    Singh, Niharika
    Saini, Mandeep Singh
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3211 - 3216
  • [4] A robust 4G/LTE network authentication for realization of flexible and robust security scheme
    Singh, Niharika
    Saini, Mandeep Singh
    Proceedings of the 10th INDIACom; 2016 3rd International Conference on Computing for Sustainable Global Development, INDIACom 2016, 2016, : 3211 - 3216
  • [5] Feasibility of Desynchronization Attack in LTE/SAE Networks
    Agarwal, Pranay
    Kumar, Abhinav
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 801 - 803
  • [6] CAP on Mobility Control for 4G LTE Networks
    Li, Yuanjie
    Yuan, Zengwen
    Peng, Chunyi
    Lu, Songwu
    PROCEEDINGS OF THE 3RD WORKSHOP ON HOT TOPICS IN WIRELESS (HOTWIRELESS '16), 2016, : 33 - 37
  • [7] Distributed Security Architecture for Authentication in 4G Networks
    Niranjani, D.
    Durga, M. Ganaga
    2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 286 - 291
  • [8] Coverage and Capacity Optimization for 4G LTE Networks Using Differential Evolution
    Cheng Yanyun
    Alexis, Huet
    Xu Hui
    Yan Xingxiu
    PROCEEDINGS OF 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2018, : 640 - 645
  • [9] An Evaluation of Scheduling Algorithms in LTE based 4G Networks
    Qurat-ul-Ain
    ul Hassnain, Syed Riaz
    Shah, Mudassir
    Mahmud, Sahibzada Ali
    2015 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET), 2015,
  • [10] VoLTE*: A Lightweight Voice Solution to 4G LTE Networks
    Tu, Guan-Hua
    Li, Chi -Yu
    Peng, Chunyi
    Yuan, Zengwen
    Li, Yuanjie
    Zhao, Xiaohu
    Lu, Songwu
    HOTMOBILE'16: PROCEEDINGS OF THE 17TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, 2016, : 3 - 8