Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World

Long Term Evolution (LTE) and Long Term Evolution-Advanced (LTE-A) support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased...

Full description

Bibliographic Details
Main Authors: Jong Hyuk Park, Hyungjoo Kim, Jungho Kang
Format: Article
Language:English
Published: MDPI AG 2016-10-01
Series:Symmetry
Subjects:
Online Access:http://www.mdpi.com/2073-8994/8/10/106
_version_ 1817993018622345216
author Jong Hyuk Park
Hyungjoo Kim
Jungho Kang
author_facet Jong Hyuk Park
Hyungjoo Kim
Jungho Kang
author_sort Jong Hyuk Park
collection DOAJ
description Long Term Evolution (LTE) and Long Term Evolution-Advanced (LTE-A) support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE) is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI) and Radio Network Temporary Identities (RNTI) are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME). The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB) and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.
first_indexed 2024-04-14T01:34:10Z
format Article
id doaj.art-ae288ba2b64e42fd8074aec761c824e0
institution Directory Open Access Journal
issn 2073-8994
language English
last_indexed 2024-04-14T01:34:10Z
publishDate 2016-10-01
publisher MDPI AG
record_format Article
series Symmetry
spelling doaj.art-ae288ba2b64e42fd8074aec761c824e02022-12-22T02:20:04ZengMDPI AGSymmetry2073-89942016-10-0181010610.3390/sym8100106sym8100106Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber WorldJong Hyuk Park0Hyungjoo Kim1Jungho Kang2Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), 232 Gongneung-ro, Nowon-gu, Seoul 01811, KoreaConvergence Laboratory, KT Research and Development Center, 151 Taebong-ro, Seocho-gu, Seoul 06763, KoreaDepartment of Computer Science and Engineering, Soongsil University, 369 Sangdo-Ro, Dongjak-gu, Seoul 06978, KoreaLong Term Evolution (LTE) and Long Term Evolution-Advanced (LTE-A) support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE) is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI) and Radio Network Temporary Identities (RNTI) are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME). The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB) and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.http://www.mdpi.com/2073-8994/8/10/106initial attachmutual authenticationLTEhiding technicsession management
spellingShingle Jong Hyuk Park
Hyungjoo Kim
Jungho Kang
Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World
Symmetry
initial attach
mutual authentication
LTE
hiding technic
session management
title Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World
title_full Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World
title_fullStr Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World
title_full_unstemmed Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World
title_short Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World
title_sort security scheme based on parameter hiding technic for mobile communication in a secure cyber world
topic initial attach
mutual authentication
LTE
hiding technic
session management
url http://www.mdpi.com/2073-8994/8/10/106
work_keys_str_mv AT jonghyukpark securityschemebasedonparameterhidingtechnicformobilecommunicationinasecurecyberworld
AT hyungjookim securityschemebasedonparameterhidingtechnicformobilecommunicationinasecurecyberworld
AT junghokang securityschemebasedonparameterhidingtechnicformobilecommunicationinasecurecyberworld