Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World
Long Term Evolution (LTE) and Long Term Evolution-Advanced (LTE-A) support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2016-10-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | http://www.mdpi.com/2073-8994/8/10/106 |
_version_ | 1817993018622345216 |
---|---|
author | Jong Hyuk Park Hyungjoo Kim Jungho Kang |
author_facet | Jong Hyuk Park Hyungjoo Kim Jungho Kang |
author_sort | Jong Hyuk Park |
collection | DOAJ |
description | Long Term Evolution (LTE) and Long Term Evolution-Advanced (LTE-A) support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE) is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI) and Radio Network Temporary Identities (RNTI) are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME). The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB) and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards. |
first_indexed | 2024-04-14T01:34:10Z |
format | Article |
id | doaj.art-ae288ba2b64e42fd8074aec761c824e0 |
institution | Directory Open Access Journal |
issn | 2073-8994 |
language | English |
last_indexed | 2024-04-14T01:34:10Z |
publishDate | 2016-10-01 |
publisher | MDPI AG |
record_format | Article |
series | Symmetry |
spelling | doaj.art-ae288ba2b64e42fd8074aec761c824e02022-12-22T02:20:04ZengMDPI AGSymmetry2073-89942016-10-0181010610.3390/sym8100106sym8100106Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber WorldJong Hyuk Park0Hyungjoo Kim1Jungho Kang2Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), 232 Gongneung-ro, Nowon-gu, Seoul 01811, KoreaConvergence Laboratory, KT Research and Development Center, 151 Taebong-ro, Seocho-gu, Seoul 06763, KoreaDepartment of Computer Science and Engineering, Soongsil University, 369 Sangdo-Ro, Dongjak-gu, Seoul 06978, KoreaLong Term Evolution (LTE) and Long Term Evolution-Advanced (LTE-A) support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE) is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI) and Radio Network Temporary Identities (RNTI) are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME). The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB) and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.http://www.mdpi.com/2073-8994/8/10/106initial attachmutual authenticationLTEhiding technicsession management |
spellingShingle | Jong Hyuk Park Hyungjoo Kim Jungho Kang Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World Symmetry initial attach mutual authentication LTE hiding technic session management |
title | Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World |
title_full | Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World |
title_fullStr | Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World |
title_full_unstemmed | Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World |
title_short | Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World |
title_sort | security scheme based on parameter hiding technic for mobile communication in a secure cyber world |
topic | initial attach mutual authentication LTE hiding technic session management |
url | http://www.mdpi.com/2073-8994/8/10/106 |
work_keys_str_mv | AT jonghyukpark securityschemebasedonparameterhidingtechnicformobilecommunicationinasecurecyberworld AT hyungjookim securityschemebasedonparameterhidingtechnicformobilecommunicationinasecurecyberworld AT junghokang securityschemebasedonparameterhidingtechnicformobilecommunicationinasecurecyberworld |