Distributed Security Architecture for Authentication in 4G Networks

被引:0
作者
Niranjani, D. [1 ]
Durga, M. Ganaga [1 ]
机构
[1] Bharathiar Univ, Coimbatore, Tamil Nadu, India
来源
2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA) | 2016年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
4G network is the highly advanced wireless network which aids broadband as well as multimedia applications. 4G uses the TCP/IP architecture as the network backbone with open interfaces, which makes it susceptible to various network security risks. The increased set of features available at the user terminal also leads to the maximization of the security risks in 4G network. Hence, to overcome the security problems in the 4G network, in this paper we propose to develop distributed security architecture for authentication. In this proposed architecture, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used for authenticating the mobile nodes within the network through hop by hop authentication and neighbor authentication.
引用
收藏
页码:286 / 291
页数:6
相关论文
共 11 条
[1]   Local fast re-authentication for 3G-WLAN interworking [J].
Al Shidhani, Ali ;
Leung, Victor C. M. .
SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (04) :309-323
[2]  
Dhar Tamal, 2013, INT J COMPUTER SCI I, V3, P2249
[3]  
Elramly S, 2013, INT CONF IT CONVERGE
[4]   Security Analysis of Handover Key Management in 4G LTE/SAE Networks [J].
Han, Chan-Kyu ;
Choi, Hyoung-Kee .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (02) :457-468
[5]  
He Dake, INT S BIOM SEC TECHN
[6]  
Muraleedharan Rajani, 2007, 2007 IEEE GLOB
[7]  
Park Y., 2007, WORKSH SEC PRIV 4G N
[8]  
Rengaraju Perumalraja, 2014, IEEE T VEHICULAR TEC, V63
[9]  
Saedy M, 2011, WIREL TELECOMM SYMP
[10]  
Seddigh N., 2010, 8 ANN INT C PRIV SEC