2016
DOI: 10.1016/j.procs.2016.06.033
|View full text |Cite
|
Sign up to set email alerts
|

Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…1, a desynchronisation attack and a root key update requested by the UE are assumed to take place at τ 2 and τ 3 , respectively. 7 As a part of handover preparation, the UE performs measurements of the received signals from the neighboring eNodeBs and sends the measurement reports to the source eNodeB to identify the target cell(s) for handover [36]. During this phase, the uplink and downlink channels for LTE Radio Resource Control (RRC) connection establishment procedure are secured for sharing the measurement reports between the UE and eNodeB, controlling the key sharing, signalling of handover requests, and acknowledgement between eNodeBs.…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…1, a desynchronisation attack and a root key update requested by the UE are assumed to take place at τ 2 and τ 3 , respectively. 7 As a part of handover preparation, the UE performs measurements of the received signals from the neighboring eNodeBs and sends the measurement reports to the source eNodeB to identify the target cell(s) for handover [36]. During this phase, the uplink and downlink channels for LTE Radio Resource Control (RRC) connection establishment procedure are secured for sharing the measurement reports between the UE and eNodeB, controlling the key sharing, signalling of handover requests, and acknowledgement between eNodeBs.…”
Section: System Modelmentioning
confidence: 99%
“…Consequently, the attacker can either decipher the communications between a genuine eNodeB and a UE or compromise all future keys between specific UEs and eNodeBs for further active attacks. To prevent desynchronisation attacks, the authors of [7] proposed an approach with double authentication. However, both source and destination nodes are required to generate keys, which causes double signaling overhead.…”
Section: Introductionmentioning
confidence: 99%
“…Mathi and Dharuman [17] design a scheme to prevent the desynchronization attack due to rogue base station in handover key management of 4G LTE network. The proposed scheme generates a new key for future communication between the Target eNB and UE after the Target eNB is verified by the MME.…”
Section: Related Workmentioning
confidence: 99%
“…www.ijacsa.thesai.org Therefore, the total size of authentication parameters (T AP ) that are exchanged between the handover entities is calculated as indicated in (6). The total size of authentication parameters of the handover key management schemes, as depicted in Table 6, the proposed scheme , Khairy et al [12] scheme and Mathi and Dharuman [17] scheme, consume during the handover key management (3456), (4224) and (2432) bits, respectively while, Lin et al [15] scheme and the current scheme consume 2176 bits.…”
Section: B Bandwidth Overheadmentioning
confidence: 99%
“…The main shortage in this proposal is that limited types of data and files can be exchanged over clouds. Senthilkumar Mathi * and Lavanya Dharuman [14] are proposed scheme to overcome the desynchronization problem in 4G LTE network using Double Authentication technique. The scheme shows efficiency in terms of communication cost.…”
Section: Literature Surveymentioning
confidence: 99%