Publication Type : Conference Paper
Publisher : Elsevier Proceedia Computer Science [Web of Science and SCOPUS Indexed], Elsevier,
Source : Elsevier Proceedia Computer Science [Web of Science and SCOPUS Indexed], Elsevier, Volume 89, p.170-179 (2016)
Url : https://www.sciencedirect.com/science/article/pii/S1877050916310985
Keywords : 3gpp long term evolutions, 4G mobile communication systems, Authentication, Base stations, Computer crime, Confidentiality, Data mining, De-synchronization attacks, Desynchronization, Double authentication schemes, Image processing, Long Term Evolution (LTE), Mobile security, Mobile telecommunication systems, Network simulators, Public key cryptography, Queueing networks, Secured communication, Session key, Signal processing, Telecommunication networks, Warehouses, Wireless telecommunication systems
Campus : Coimbatore
School : School of Engineering
Department : Computer Science
Year : 2016
Abstract : The core objective of 3GPP Long Term Evolution (LTE) is to provide a secured communication and high data rate for 4G users. Even though 4G network provides security, there are loopholes which lead to several attacks in 4G network. One such attack is desynchronization attack in 3GPP handover key management. This paper deliberates the vulnerability of desynchronization attack that occurs when source acts as rogue base station in 3GPP. In addition, it discusses how this attack jeopardizes the communication in 4G network and subsequently proposes a new scheme to overcome this attack. In the proposed scheme, the target generates its own key rather than using the key generated by source node for future communication with target to achieve a secure communication between the source and target base station in 4G LTE. The proposed scheme is simulated using network simulator 3 (NS-3). The numerical analysis shows that the proposed scheme achieves a significant reduction in the communication cost for key generation and authentication in LTE. © 2016 Elsevier B.V. All rights reserved.
Cite this Research Publication : Dr. Senthil Kumar M. and Dharuman, L., “Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme”, in Elsevier Proceedia Computer Science [Web of Science and SCOPUS Indexed], 2016, vol. 89, pp. 170-179.