Packet key-based security system for the next generation LTE networks

被引:4
|
作者
Saini, Akanksha [1 ]
Festijo, Enrique D. [2 ]
Jung, Younchan [1 ]
机构
[1] Catholic Univ Korea, Sch Informat Commun & Elect Engn, Bucheon Si 420743, Gyeonggi Do, South Korea
[2] Technol Inst Philippines, Dept Elect Engn, Manila, Philippines
来源
14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS | 2017年 / 110卷
基金
新加坡国家研究基金会;
关键词
End-to-End LTE users; End-to-End security management; Packet key; Post-LTE security; Real-time encryption;
D O I
10.1016/j.procs.2017.06.098
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes the end-to-end security scheme with packet key mechanism to perform ciphering of user traffic between two UEs attached to the different LTE networks. In LTE system, each UE derives its master key after a mutual authentication is performed between the UE and its local LTE network. In this paper, two end-to-end UEs use their own master keys to generate real-time packet keys where different packet keys are applied to encrypt packet stream data on a packet basis. Because the life cycle of the packet key is same as a packet period, the proposed security scheme significantly improves the security strength for end-to-end LTE users. As a result, this paper contributes to suggest the security scheme with packet key mechanism that can provide high level of security as well as end-to-end security for the global LTE UEs. (C) 2017 The Authors. Published by Elsevier B.V.
引用
收藏
页码:297 / 303
页数:7
相关论文
共 50 条
  • [21] On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
    Mohaisen, Abedelaziz
    Choi, Jeong Woon
    Hong, Dowon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2009, 3 (04): : 376 - 384
  • [22] Integrating Security with QoS in Next Generation Networks
    Taleb, Tarik
    Aoul, Yassine Hadjadj
    Benslimane, Abderrahim
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [23] Threats and security defense of next generation networks
    Baluja-Garcia, Walter
    Anias-Calderon, Caridad
    INGENIERIA Y COMPETITIVIDAD, 2006, 8 (02): : 7 - 16
  • [24] On the Handover Security Key Update and Residence Management in LTE Networks
    Quoc-Tuan Vien
    Tuan Anh Le
    Yang, Xin-She
    Duong, Trung Q.
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [25] An overview of key technologies for the next generation networks
    Green, H
    Ghiggino, P
    OPTICAL NETWORKS AND TECHNOLOGIES, 2005, 164 : 31 - 43
  • [26] INTERWORKING OF WLAN-LTE FOR NEXT GENERATION WIRELESS NETWORKS
    Vijayalakshmy, G.
    Sivaradje, G.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [27] On the Security of Key-Based Interval Splitting Arithmetic Coding With Respect to Message Indistinguishability
    Katti, Rajendra S.
    Vosoughi, Aida
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 895 - 903
  • [28] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2011, 27 (06): : 767 - 785
  • [29] Media coding for the next generation mobile system LTE
    Jarvinen, Kari
    Bouazizi, Imed
    Laaksonen, Lasse
    Ojala, Pasi
    Ramo, Anssi
    COMPUTER COMMUNICATIONS, 2010, 33 (16) : 1916 - 1927
  • [30] Design and implementation of a public key-based group collaboration system
    Clarke, Dwaine
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 407 - 422