STUDY ON PROTECTION OF ENTRUST KEY MANAGEMENT IN 4G LTE NETWORKS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 8
Abstract
To minimize a security gap in the networks which a single compromised or malicious device can expose an entire mobile network because of the open nature of these networks. The attacker can launch a variety of active and passive attacks. Thus security mechanism is to be defined for call security in 4G/LTE network. The existing scheme includes plain - text certificate key authentication and cryptographic key exchanges. Thus the set of cryptographic key exchange schemes can effectively establish the secure communications between the two node s and protect against the node emulation attacks. In this paper the traditional key exchange models of 4G/LTE network and hybrid cryptographic key exchange model and the security provided by these are evaluated. The proposed model will protect the 4G netwo rk during the initial call setup phase, periodic time based key exchange to ensure the call security and the seed exchange for the other end integrity check. The proposed model will use a pre - shared key group to ensure the security during the call setup ph ase and will use the random table based non - predictive key exchange model for the purpose of in - call security assurance and receiver integrity check by the caller
Authors and Affiliations
S. Sindhu
DESIGN OF C-SLOT ANTENNA FOR WIDE BAND APPLICATIONS WITH STOP BAND OPEARTION
Antenna is a vital component in wireless application systems. Antenna is important for establishing effective communication between places at different location. The microstrip antenna can be used for wireless app...
Design of DTS for Clustered Wireless Sensor Networks
The dependability of trust system and resource efficiency are the most fundamental requirements for any Wireless Sensor Network (WSN). However, the existing trust systems developed for WSNs are lacking in satisfyi...
Wireless Sensor Networks with Minimum Utilization and Maximum Life Time under Joint Routing
The design of applications and protocols for sensor networks has the issues of minimizing energy utilization and maximizing network lifetime. Energy-efficient sensor state planning consists in finding an optimal...
Analysis Of Upfc Based Damping Controller On A Single Machine Infinite Bus
The investigations reveal that the damping controllers based on UPFC control parameters
Simulation of Technical Systems on the basis of Vector Optimization (1. Equivalent Criteria)
Presents a new methodology for modeling technical systems (TS), a model of which is represented by a vector problem of mathematical programming (VPMP). The model is designed for evaluation and selection of necess...