A novel authentication scheme for long-term evolution mobility management: A security investigation

Author:

Mathi Senthilkumar1,Ramalingam Venkadeshan2,Sree Keerthi Angara Venkata1,Abhirup Kothamasu Ganga1,Sreejith K.1,Dharuman Lavanya1

Affiliation:

1. Department of Computer Science and Engineering, Amrita School of Computing, Coimbatore, Amrita Vishwa Vidyapeetham, India

2. Faculty in Information Technology Department, University of Technology and Applied Sciences-Shinas, Sultanate of Oman, Oman

Abstract

Long-term evolution in wireless broadband communication aims to provide secure communication for users and a high data rate for a fourth-generation network. Even though the fourth-generation network provides security, some loopholes lead to several attacks on the fourth-generation network attacks. The denial-of-service attack occurs when the user communicates with a rogue base station, and the radio base station in fourth-generation long-term evolution networks ensures that the user is attached to the rogue node assigned network. The location leak attack occurs when the packets are sniffed to find any user’s location using its temporary mobile subscriber identity. Prevention of rogue base station and location leak attacks helps the system achieve secure communication between the participating entities. Earlier works in long-term evolution mobility management do not address preventing attacks such as denial-of-service, rogue base stations and location leaks and suffer from computational costs while providing security features. Hence, the present paper addresses the vulnerability of these attacks. It also investigates how these attacks occur and exposes communication in the fourth-generation network. To mitigate these vulnerabilities, the paper proposes a novel authentication scheme. The proposed scheme is simulated using Network Simulator 3, and the security analysis of the proposed scheme is shown using AVISPA –a security tool. Numerical analysis demonstrates that the proposed scheme significantly reduces communication overhead and computational costs associated with the fourth-generation long-term evolution authentication mechanism.

Publisher

IOS Press

Reference17 articles.

1. Performance and security-enhanced authentication and key agreement protocol for SAE/LTE network;Degefa Fikadu;Computer Networks,2016

2. Comprehensive survey of possible security issues on 4G networks;Mohapatra Sumant Ku;International Journal of Network Security & its Applications,2015

3. Security analysis of hankey management in 4G LTE/SAE networks;Han Chan-Kyu;IEEE Transactions on Mobile Computing,2014

4. Analysis of UMTS (3G) Authentication and Key Agreement Protocol (AKA) for LTE (4G) Network,ISSN:;Choudhary Anilmit;International Journal on Recent and Innovation Trends in Computing and Communication,2015

5. Integrating non-linear and linear diffusion techniques to prevent fault attacks in advanced encryption standard to enhance security of 4G-LTE networks;Kumar Mathi;Defence Science Journal,2017

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3