STUDY ON PROTECTION OF ENTRUST KEY MANAGEMENT IN 4G LTE NETWORKS

Abstract

To minimize a security gap in the networks which a single compromised or malicious device can expose an entire mobile network because of the open nature of these networks. The attacker can launch a variety of active and passive attacks. Thus security mechanism is to be defined for call security in 4G/LTE network. The existing scheme includes plain - text certificate key authentication and cryptographic key exchanges. Thus the set of cryptographic key exchange schemes can effectively establish the secure communications between the two node s and protect against the node emulation attacks. In this paper the traditional key exchange models of 4G/LTE network and hybrid cryptographic key exchange model and the security provided by these are evaluated. The proposed model will protect the 4G netwo rk during the initial call setup phase, periodic time based key exchange to ensure the call security and the seed exchange for the other end integrity check. The proposed model will use a pre - shared key group to ensure the security during the call setup ph ase and will use the random table based non - predictive key exchange model for the purpose of in - call security assurance and receiver integrity check by the caller

Authors and Affiliations

S. Sindhu

Keywords

Related Articles

 DESIGN OF C-SLOT ANTENNA FOR WIDE BAND APPLICATIONS WITH STOP BAND OPEARTION

 Antenna is a vital component in wireless application systems. Antenna is important for establishing effective communication between places at different location. The microstrip antenna can be used for wireless app...

 Design of DTS for Clustered Wireless Sensor Networks

 The dependability of trust system and resource efficiency are the most fundamental requirements for any Wireless Sensor Network (WSN). However, the existing trust systems developed for WSNs are lacking in satisfyi...

 Wireless Sensor Networks with Minimum Utilization and Maximum Life Time under Joint Routing

 The design of applications and protocols for sensor networks has the issues of minimizing energy utilization and maximizing network lifetime. Energy-efficient sensor state planning consists in finding an optimal...

 Analysis Of Upfc Based Damping Controller On A Single Machine Infinite Bus

 The investigations reveal that the damping controllers based on UPFC control parameters

 Simulation of Technical Systems on the basis of Vector Optimization (1. Equivalent Criteria)

 Presents a new methodology for modeling technical systems (TS), a model of which is represented by a vector problem of mathematical programming (VPMP). The model is designed for evaluation and selection of necess...

Download PDF file
  • EP ID EP100737
  • DOI -
  • Views 80
  • Downloads 0

How To Cite

S. Sindhu (0). STUDY ON PROTECTION OF ENTRUST KEY MANAGEMENT IN 4G LTE NETWORKS. International Journal of Engineering Sciences & Research Technology, 4(8), 653-661. https://europub.co.uk/articles/-A-100737