ENHANCED ADAPTIVE SECURITY PROTOCOL IN LTE AKA?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 10)Publication Date: 2014-10-30
Authors : Uwaya Fidelis; Madhavi Kumari;
Page : 584-594
Keywords : LTE; Security; AKA; 3GPP; 4G;
Abstract
A Telecommunication systems trust and privacy is as good as its security mechanism. Its security design keep evolving over time as new treats and technology evolve. LTE/SAE is 3GPP’s wireless Communication new DNA, a move away from a hybrid of packet switched and circuit switched network which 3G networks possess, though with room for backward compatibility. LTE/SAE’s new architecture is a flat IP architecture; it therefore comes with all security issues inherent in IP network coupled with the design having non-3GPP heterogeneous technologies integrated into it. Its’ security cryptography, rides on the good features of 3GPP AKA cryptographic algorithms, used in UMTS and added new ones. Some major security concerns in LTE/SAE from several researchers work points to, user privacy concerns, threats to UE/USIM tracking, base stations and handovers, broadcast or multicast signaling, denial of service (DOS), manipulation of control plane, unauthorized access to network, compromise of eNB credential and physical attack on an eNB protocol attack on eNB and attack on the core network and eNB location based attacks. In this paper, we will be analyzing, LTE/AKA architecture and its vulnerability, after which we will be proposing a protocol, referred to as Security Enhanced Adaptive Protocol (SEAP-AKA), which is to prove to eliminate the importance of synchronization between a cell station and its home system. SEAP-AKA specifies six flows sequence with respect to execution environment. Entities of the new protocol possess flexibility as it adaptively picks out flow for execution, which helps to optimize this efficiency both in the home network and Mobile network. More so, SEAP-AKA will show a Security Enhanced Authentication along with Key Agreement dependent on Wireless Public Key National infrastructure (WPKI). Then, the brand new protocol shall be proved with the formal verification method, and the proof result shall demonstrates the new protocol and how it satisfies the security along with efficiency properties from the LTE/SAE buildings note that, existing 128 bit encryption existing in UMTS is same used here in LTE.
Other Latest Articles
Last modified: 2014-10-27 23:47:35