CFP last date
20 May 2024
Reseach Article

Performance Evaluation of Secure Asymmetric Key Exchange Mechanisms for 4G Networks

by Niharika Singh, Mandeep Singh Saini
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 23
Year of Publication: 2015
Authors: Niharika Singh, Mandeep Singh Saini
10.5120/20884-3644

Niharika Singh, Mandeep Singh Saini . Performance Evaluation of Secure Asymmetric Key Exchange Mechanisms for 4G Networks. International Journal of Computer Applications. 118, 23 ( May 2015), 10-15. DOI=10.5120/20884-3644

@article{ 10.5120/20884-3644,
author = { Niharika Singh, Mandeep Singh Saini },
title = { Performance Evaluation of Secure Asymmetric Key Exchange Mechanisms for 4G Networks },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 23 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number23/20884-3644/ },
doi = { 10.5120/20884-3644 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:02:29.944388+05:30
%A Niharika Singh
%A Mandeep Singh Saini
%T Performance Evaluation of Secure Asymmetric Key Exchange Mechanisms for 4G Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 23
%P 10-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The 4G network are cellular network which provides higher bandwidth and fast speed but there are few security flaws and thus to protect the users privacy,a very well defined security support is mandatory. The attacker can launch a variety of active and passive attacks. Thus security mechanism is to be defined for call security in 4G/LTE network. The existing schemes includes both plain-text and cryptographic key exchanges. The cryptographic key exchange schemes can effectively establish the secure communications between the two nodes and protect against the node emulation attacks. In this paper the traditional key exchange models of 4G/LTE network and hybrid cryptographic key exchange model and the security provided by these are evaluated. The proposed model will protect the 4G network during the initial call setup phase, periodic time based key exchange to ensure the call security and the seed exchange for the other end integrity check. The proposed model will use a pre-shared key group to ensure the security during the call setup phase and will use the random table based non-predictive key exchange model for the purpose of in-call security assurance and receiver integrity check by the caller. This performance evaluation survey will evaluate these two authentication methods for various scenarios in the 4G network. The conclusion after the comparison would throw light on appropriate scenarios of both the schemes used in 4G/LTE security.

References
  1. Alezabi, Kamal Ali, et al. "An efficient authentication and key agreement protocol for 4G (LTE) networks. " Region 10 Symposium, 2014 IEEE. IEEE, 2014.
  2. Bikos, Anastasios N. , and Nicolas Sklavos. "LTE/SAE security issues on 4G wireless networks. " Security & Privacy, IEEE 11. 2 (2013): 55-62.
  3. Chandramouli, Ramaswamy, Michaela Iorga, and Santosh Chokhani. Cryptographic Key Management Issues and Challenges in Cloud Services. Springer New York, 2014.
  4. Chen, Fatang, and Jinlong Yuan. "Enhanced Key Derivation Function of HMAC-SHA-256 Algorithm in LTE Network. " Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on. IEEE, 2012.
  5. Damgård, Ivan, et al. "Sescure key management in the cloud. " Cryptography and Coding. Springer Berlin Heidelberg, 2013. 270-289.
  6. Elramly, Salwa, et al. "SMSHM: Secure Mesh Mode Protocol to Enhance Security of 4G Networks. " IT Convergence and Security (ICITCS), 2013 International Conference on. IEEE, 2013.
  7. Han, Chan-Kyu, and Hyoung-Kee Choi. "Security analysis of handover key management in 4G LTE/SAE networks. " Mobile Computing, IEEE Transactions on 13. 2 (2014): 457-468.
  8. Leu, Fang-Yie, et al. "Improving security level of LTE authentication and key agreement procedure. " Globecom Workshops (GC Wkshps), 2012 IEEE. IEEE, 2012.
  9. Ma Ma, Maode. "Security Investigation in 4G LTE Wireless Networks. " School of Elecrical and Electronic Engineering, Nanyang Technological University, Singapore (2012).
  10. Morshed, Md Monzur, and Md Rafiqul Islam. "CBSRP: Cluster Based Secure Routing Protocol. " Advance Computing Conference (IACC), 2013 IEEE 3rd International. IEEE, 2013.
  11. N. Suganthi, N. , and Sumathy Vembu. "Energy Efficient Key Management Scheme for Wireless Sensor Networks. " International Journal of Computers Communications & Control 9. 1 (2014): 71-78.
  12. Sanzziri, Ameva, et al. "SESAME: Smartphone enabled secure access to multiple entities. " Computing, Networking and Communications (ICNC), 2013 International Conference on. IEEE, 2013.
  13. Seddigh, Nabil, et al. "Security advances and challenges in 4G wireless networks. " Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on. IEEE, 2010.
  14. Sharma, Madhu J. , and Victor CM Leung. "IP Multimedia subsystem authentication protocol in LTE-heterogeneous networks. " Human-Centric Computing and Information Sciences 2. 1 (2012): 1-19.
  15. Sithirasenan, Elankayer, et al. "EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability. " Selected Topics in WiMAX (2013): 978-953.
  16. Tiloca, Marco, et al. "SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks. " Emerging Technologies & Factory Automation (ETFA), 2013 IEEE 18th Conference on. IEEE, 2013.
  17. Zhou, Zongwei, et al. "KISS:"Key It Simple and Secure" Corporate Key Management. " Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2013. 1-18
Index Terms

Computer Science
Information Sciences

Keywords

4G networks cellular security performance evaluation key exchange models key management predictive key management cryptographic key exchange etc.