2014
DOI: 10.1109/tmc.2012.242
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Handover Key Management in 4G LTE/SAE Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
61
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 66 publications
(66 citation statements)
references
References 20 publications
0
61
0
Order By: Relevance
“…Therefore, an adversary can leave the Target eNB desynchronized and the session keys of the next handover processes vulnerable to compromise, then the adversary can decrypt all messages between the UE and eNB, this is known as the desynchronizing attack [10], [20].…”
Section: Security Drawbacks Of the X2 Handovermentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, an adversary can leave the Target eNB desynchronized and the session keys of the next handover processes vulnerable to compromise, then the adversary can decrypt all messages between the UE and eNB, this is known as the desynchronizing attack [10], [20].…”
Section: Security Drawbacks Of the X2 Handovermentioning
confidence: 99%
“…In 2014, Han and Choi [10] propose a scheme to overcome the desynchronization attack of the handover process in the LTE network. An algorithm to derive the key based on specific minimal interval time has introduced.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As eNodeBs are exposed to the public locations and the internet-protocol-architecture nature of the network, handover-key management process is vulnerable to attacks deployed by bogus eNodeBs [5]. Such attacks are referred to as desynchronization attacks [6], [7].…”
Section: Introductionmentioning
confidence: 99%
“…[6], [10], [11]. In [6], a mathematical model was developed to represent the average number of exposed packages (NEP) between two root key updates and the average value of signaling overhead rate (SOR) 3 . A heuristic algorithm was also proposed in [6] to search for an optimal root KUI based on empirical data.…”
Section: Introductionmentioning
confidence: 99%