STUDY ON PROTECTION OF ENTRUST KEY MANAGEMENT IN 4G LTE NETWORKS

Abstract

To minimize a security gap in the networks which a single compromised or malicious device can expose an entire mobile network because of the open nature of these networks. The attacker can launch a variety of active and passive attacks. Thus security mechanism is to be defined for call security in 4G/LTE network. The existing scheme includes plain - text certificate key authentication and cryptographic key exchanges. Thus the set of cryptographic key exchange schemes can effectively establish the secure communications between the two node s and protect against the node emulation attacks. In this paper the traditional key exchange models of 4G/LTE network and hybrid cryptographic key exchange model and the security provided by these are evaluated. The proposed model will protect the 4G netwo rk during the initial call setup phase, periodic time based key exchange to ensure the call security and the seed exchange for the other end integrity check. The proposed model will use a pre - shared key group to ensure the security during the call setup ph ase and will use the random table based non - predictive key exchange model for the purpose of in - call security assurance and receiver integrity check by the caller

Authors and Affiliations

S. Sindhu

Keywords

Related Articles

 Analysis of Ulcer Wound Using Fuzzy Logic

 Patient wound image analysis finds its application in healthcare to monitor the extent of wound healing and to decide the course of treatment. To demonstrate the effects of a new drug, in wound healing techniques,...

 AN OVERVIEW OF EFFECT OF ELECTRO HYDRODYNAMIC ON PERFORMANCE OF REFRIGERATION SYSTEM WITH R-134A.

 Heat transfer enhancement in refrigeration system is reviewed in this paper. Which explain EHD effect given and experimental results obtained are discussed. R-134a is common refrigerant for many application now so...

 Performance Analysis of Routing Protocol in IEEE 802.15.4 Wireless Sensor Network

 The popularity of Wireless Sensor Networks (WSN) have increased tremendously in recent time due to growth in Micro-Electro-Mechanical Systems (MEMS) technology. WSN has the potentiality to connect the physical wor...

 DESIGN AND DEVELOPMENT OF BILIRAN PROVINCE OFFICIAL WEBSITE

 The Biliran Province Official Website is a web system or a social networking site which was designed to be a source of increase in tourism through online advertising but not limited only on information sharing...

 OPTIMAL LOCATION OF TCSC AND SVC DEVICES TO ENHANCE POWER SYSTEM SECURITY

 Contingency analysis in power system security is an important tasks in emerging energy management systems. Contingency ranking using the performance index value is a method for the line outages in a system, which...

Download PDF file
  • EP ID EP100737
  • DOI -
  • Views 60
  • Downloads 0

How To Cite

S. Sindhu (0). STUDY ON PROTECTION OF ENTRUST KEY MANAGEMENT IN 4G LTE NETWORKS. International Journal of Engineering Sciences & Research Technology, 4(8), 653-661. https://europub.co.uk/articles/-A-100737