Packet key-based security system for the next generation LTE networks

被引:4
|
作者
Saini, Akanksha [1 ]
Festijo, Enrique D. [2 ]
Jung, Younchan [1 ]
机构
[1] Catholic Univ Korea, Sch Informat Commun & Elect Engn, Bucheon Si 420743, Gyeonggi Do, South Korea
[2] Technol Inst Philippines, Dept Elect Engn, Manila, Philippines
来源
14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS | 2017年 / 110卷
基金
新加坡国家研究基金会;
关键词
End-to-End LTE users; End-to-End security management; Packet key; Post-LTE security; Real-time encryption;
D O I
10.1016/j.procs.2017.06.098
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes the end-to-end security scheme with packet key mechanism to perform ciphering of user traffic between two UEs attached to the different LTE networks. In LTE system, each UE derives its master key after a mutual authentication is performed between the UE and its local LTE network. In this paper, two end-to-end UEs use their own master keys to generate real-time packet keys where different packet keys are applied to encrypt packet stream data on a packet basis. Because the life cycle of the packet key is same as a packet period, the proposed security scheme significantly improves the security strength for end-to-end LTE users. As a result, this paper contributes to suggest the security scheme with packet key mechanism that can provide high level of security as well as end-to-end security for the global LTE UEs. (C) 2017 The Authors. Published by Elsevier B.V.
引用
收藏
页码:297 / 303
页数:7
相关论文
共 50 条
  • [1] A Secret Key-Based Security Architecture for Wireless Sensor Networks
    Chowdhury, Anuva
    Tanzila, Farzana Alam
    Chowdhury, Shanta
    Haque, Md. Mokammel
    2015 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION ENGINEERING (ICCIE), 2015, : 79 - 82
  • [2] An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
    Haque, Md. Mokammel
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    Huh, Eui-Nam
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (05): : 265 - 279
  • [3] Packet Key-Based End-to-End Security Management on a Blockchain Control Plane
    Jung, Younchan
    Peradilla, Marnel
    Agulto, Ronnel
    SENSORS, 2019, 19 (10):
  • [4] Proposing packet-key based end-to-end security architecture for the post-LTE networks
    Saini, Akanksha
    Festijo, Enrique
    Jung, Younchan
    ICT EXPRESS, 2019, 5 (02): : 124 - 130
  • [5] On the Application of Key-Based Physical Layer Security in 5G Heterogeneous Networks
    Yerrapragada, Anil Kumar
    Ormond, Patrick
    Kelley, Brian
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [6] Evaluation of Key-Based Physical Layer Security Systems
    Nazzal, T.
    Mukhtar, H.
    2021 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INFORMATION SECURITY (ICSPIS), 2021,
  • [7] A quantum key-based mobile security payment scheme
    Zhu D.
    Li X.
    Wu J.
    Song L.
    International Journal of Performability Engineering, 2019, 15 (08) : 2165 - 2172
  • [8] Dual server based security system for multimedia Services in Next Generation Networks
    Faria Jan Siddiqui
    Humaira Ashraf
    Ata Ullah
    Multimedia Tools and Applications, 2020, 79 : 7299 - 7318
  • [9] Dual server based security system for multimedia Services in Next Generation Networks
    Siddiqui, Faria Jan
    Ashraf, Humaira
    Ullah, Ata
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7299 - 7318
  • [10] Multibillion packet lookup for next generation networks
    Fahad, Muhammad
    Khan, Bilal Muhammad
    Bilal, Rabia
    Young, Rupert C. D.
    Beard, Cory
    Zaidi, Syed Sajjad Haider
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 84