Distributed Security Architecture for Authentication in 4G Networks

被引:0
|
作者
Niranjani, D. [1 ]
Durga, M. Ganaga [1 ]
机构
[1] Bharathiar Univ, Coimbatore, Tamil Nadu, India
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
4G network is the highly advanced wireless network which aids broadband as well as multimedia applications. 4G uses the TCP/IP architecture as the network backbone with open interfaces, which makes it susceptible to various network security risks. The increased set of features available at the user terminal also leads to the maximization of the security risks in 4G network. Hence, to overcome the security problems in the 4G network, in this paper we propose to develop distributed security architecture for authentication. In this proposed architecture, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used for authenticating the mobile nodes within the network through hop by hop authentication and neighbor authentication.
引用
收藏
页码:286 / 291
页数:6
相关论文
共 50 条
  • [21] A ROBUST 4G/LTE NETWORK AUTHENTICATION FOR REALIZATION OF FLEXIBLE AND ROBUST SECURITY SCHEME
    Singh, Niharika
    Saini, Mandeep Singh
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3211 - 3216
  • [22] A robust 4G/LTE network authentication for realization of flexible and robust security scheme
    Singh, Niharika
    Saini, Mandeep Singh
    Proceedings of the 10th INDIACom; 2016 3rd International Conference on Computing for Sustainable Global Development, INDIACom 2016, 2016, : 3211 - 3216
  • [23] A survey on authentication and access control for mobile networks: from 4G to 5G
    Shanay Behrad
    Emmanuel Bertin
    Noel Crespi
    Annals of Telecommunications, 2019, 74 : 593 - 603
  • [24] A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks
    Bou-Harb, Elias
    Pourzandi, Makan
    Debbabi, Mourad
    Assi, Chadi
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1478 - 1489
  • [25] A survey on authentication and access control for mobile networks: from 4G to 5G
    Behrad, Shanay
    Bertin, Emmanuel
    Crespi, Noel
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (9-10) : 593 - 603
  • [26] Securing Authentication for Mobile Networks, A Survey on 4G issues and 5G answers
    Behrad, Shanay
    Bertin, Emmanuel
    Crespi, Noel
    2018 21ST CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN), 2018,
  • [27] Security Transition Roadmap to 4G and Future Generations Wireless Networks
    Al-Humaigani, Muhammad
    Dunn, Derrek B.
    Brown, DeWayne
    SSST: 2009 41ST SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2009, : 94 - 97
  • [28] Increasing QoS and security in 4G networks using cognitive intelligence
    Muraleedharan, Rajani
    Osadciw, Lisa Ann
    2007 IEEE GLOBECOM WORKSHOPS, PROCEEDINGS, 2007, : 218 - 223
  • [29] Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks
    Lanoue, Matthew J.
    Michael, James Bret
    Bollmann, Chad A.
    2021 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2021,
  • [30] A Conceptual Architecture for Advanced Location Based Services in 4G Networks
    Zhang Yun
    Gao Ren
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 6525 - +