Publication Type:

Conference Paper

Source:

Elsevier Proceedia Computer Science [Web of Science and SCOPUS Indexed], Elsevier, Volume 89, p.170-179 (2016)

URL:

https://www.scopus.com/inward/record.uri?eid=2-s2.0-84986625669&partnerID=40&md5=4c878558f0a47143e32c9e7a920ae2ce

Keywords:

3gpp long term evolutions, 4G mobile communication systems, Authentication, Base stations, Computer crime, Confidentiality, Data mining, De-synchronization attacks, Desynchronization, Double authentication schemes, Image processing, Long Term Evolution (LTE), Mobile security, Mobile telecommunication systems, Network simulators, Public key cryptography, Queueing networks, Secured communication, Session key, Signal processing, Telecommunication networks, Warehouses, Wireless telecommunication systems

Abstract:

The core objective of 3GPP Long Term Evolution (LTE) is to provide a secured communication and high data rate for 4G users. Even though 4G network provides security, there are loopholes which lead to several attacks in 4G network. One such attack is desynchronization attack in 3GPP handover key management. This paper deliberates the vulnerability of desynchronization attack that occurs when source acts as rogue base station in 3GPP. In addition, it discusses how this attack jeopardizes the communication in 4G network and subsequently proposes a new scheme to overcome this attack. In the proposed scheme, the target generates its own key rather than using the key generated by source node for future communication with target to achieve a secure communication between the source and target base station in 4G LTE. The proposed scheme is simulated using network simulator 3 (NS-3). The numerical analysis shows that the proposed scheme achieves a significant reduction in the communication cost for key generation and authentication in LTE. © 2016 Elsevier B.V. All rights reserved.

Notes:

cited By 0; Conference of 12th International Conference on Communication Networks, ICCN 2016, 12th International Conference on Data Mining and Warehousing, ICDMW 2016 and 12th International Conference on Image and Signal Processing, ICISP 2016 ; Conference Date: 19 August 2016 Through 21 August 2016; Conference Code:123476

Cite this Research Publication

Dr. Senthil Kumar M. and Dharuman, L., “Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme”, in Elsevier Proceedia Computer Science [Web of Science and SCOPUS Indexed], 2016, vol. 89, pp. 170-179.

207
PROGRAMS
OFFERED
6
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
8th
RANK(INDIA):
NIRF 2018
150+
INTERNATIONAL
PARTNERS