Distributed Security Architecture for Authentication in 4G Networks

被引:0
|
作者
Niranjani, D. [1 ]
Durga, M. Ganaga [1 ]
机构
[1] Bharathiar Univ, Coimbatore, Tamil Nadu, India
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
4G network is the highly advanced wireless network which aids broadband as well as multimedia applications. 4G uses the TCP/IP architecture as the network backbone with open interfaces, which makes it susceptible to various network security risks. The increased set of features available at the user terminal also leads to the maximization of the security risks in 4G network. Hence, to overcome the security problems in the 4G network, in this paper we propose to develop distributed security architecture for authentication. In this proposed architecture, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used for authenticating the mobile nodes within the network through hop by hop authentication and neighbor authentication.
引用
收藏
页码:286 / 291
页数:6
相关论文
共 50 条
  • [31] 4G Wireless Networks
    Varshney, Upkar
    IT PROFESSIONAL, 2012, 14 (05) : 34 - 39
  • [32] 4G mobile network architecture
    Ikkelä, K
    Myllynen, M
    Heinänen, J
    Martikainen, O
    EMERGING PERSONAL WIRELESS COMMUNICATIONS, 2001, 67 : 183 - 195
  • [33] Personal networks and 4G
    Prasad, Ramjee
    PROCEEDINGS ELMAR 2007, 2007, : 1 - 6
  • [34] Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme
    Mathi, Senthilkumar
    Dharuman, Lavanya
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 170 - 179
  • [35] A Scalable SDN Architecture for Underwater Networks Security Authentication
    Chen, Qiuli
    He, Ming
    Zheng, Xiang
    Dai, Fei
    Feng, Yuntian
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (08): : 2044 - 2052
  • [36] Security Analysis of Handover Key Management in 4G LTE/SAE Networks
    Han, Chan-Kyu
    Choi, Hyoung-Kee
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (02) : 457 - 468
  • [37] SMSHM: Secure Mesh Mode Protocol To Enhance Security of 4G Networks
    Elramly, Salwa
    Ashry, Saeed
    Elkouny, Abdulatief
    Elsherbini, Ahmed
    Elbadawy, Hesham
    2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [38] Handoff Management Architecture for 4G Networks over MIPv6
    Prakash, S.
    Akki, C. B.
    Dhruve, Kashyap
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (02): : 267 - 274
  • [39] Active networks for 4G mobile communication: Motivation, architecture, and application scenarios
    Prehofer, C
    Wei, Q
    ACTIVE NETWORKS, PROCEEDINGS, 2002, 2546 : 132 - 145
  • [40] Design and Evaluation of Remote Driving Architecture on 4G and 5G Mobile Networks
    den Ouden, Jos
    Ho, Victor
    van der Smagt, Tijs
    Kakes, Geerd
    Rommel, Simon
    Passchier, Igor
    Juza, Jakub
    Monroy, Idelfonso Tafur
    FRONTIERS IN FUTURE TRANSPORTATION, 2022, 2