The core objective of 3GPP Long Term Evolution (LTE) is to provide a secured communication and high data rate for 4G users. Even though 4G network provides security, there are loopholes which lead to several attacks in 4G network. One such attack is desynchronization attack in 3GPP handover key management. This paper deliberates the vulnerability of desynchronization attack that occurs when source acts as rogue base station in 3GPP. In addition, it discusses how this attack jeopardizes the communication in 4G network and subsequently proposes a new scheme to overcome this attack. In the proposed scheme, the target generates its own key rather than using the key generated by source node for future communication with target to achieve a secure communication between the source and target base station in 4G LTE. The proposed scheme is simulated using network simulator 3 (NS-3). The numerical analysis shows that the proposed scheme achieves a significant reduction in the communication cost for key generation and authentication in LTE. © 2016 Elsevier B.V. All rights reserved.
cited By 0; Conference of 12th International Conference on Communication Networks, ICCN 2016, 12th International Conference on Data Mining and Warehousing, ICDMW 2016 and 12th International Conference on Image and Signal Processing, ICISP 2016 ; Conference Date: 19 August 2016 Through 21 August 2016; Conference Code:123476
Dr. Senthil Kumar M. and Dharuman, L., “Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme”, in Elsevier Proceedia Computer Science [Web of Science and SCOPUS Indexed], 2016, vol. 89, pp. 170-179.