Packet key-based security system for the next generation LTE networks

被引:4
|
作者
Saini, Akanksha [1 ]
Festijo, Enrique D. [2 ]
Jung, Younchan [1 ]
机构
[1] Catholic Univ Korea, Sch Informat Commun & Elect Engn, Bucheon Si 420743, Gyeonggi Do, South Korea
[2] Technol Inst Philippines, Dept Elect Engn, Manila, Philippines
来源
14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS | 2017年 / 110卷
基金
新加坡国家研究基金会;
关键词
End-to-End LTE users; End-to-End security management; Packet key; Post-LTE security; Real-time encryption;
D O I
10.1016/j.procs.2017.06.098
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes the end-to-end security scheme with packet key mechanism to perform ciphering of user traffic between two UEs attached to the different LTE networks. In LTE system, each UE derives its master key after a mutual authentication is performed between the UE and its local LTE network. In this paper, two end-to-end UEs use their own master keys to generate real-time packet keys where different packet keys are applied to encrypt packet stream data on a packet basis. Because the life cycle of the packet key is same as a packet period, the proposed security scheme significantly improves the security strength for end-to-end LTE users. As a result, this paper contributes to suggest the security scheme with packet key mechanism that can provide high level of security as well as end-to-end security for the global LTE UEs. (C) 2017 The Authors. Published by Elsevier B.V.
引用
收藏
页码:297 / 303
页数:7
相关论文
共 50 条
  • [41] Packet scheduling scheme in the next generation high-speed wireless packet networks
    Qiu, J
    Huang, TC
    WIMOB'2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 2, PROCEEDINGS: MOBILE NETWORKING, 2005, : 224 - 227
  • [42] Key-based video watermarking system on MPEG-2
    Weng, SJ
    Lu, T
    Chang, PC
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 516 - 525
  • [43] NPKG: Novel pairwise key generation for resisting key-based threats in Wireless Sensor Network
    Vaneeta, M.
    Swapna Kumar, S.
    International Journal of Network Security, 2019, 21 (01): : 122 - 129
  • [44] P4-KBR: A Key-Based Routing System for P4-Programmable Networks
    Manzanares-Lopez, Pilar
    Munoz-Gea, Juan Pedro
    Malgosa-Sanahuja, Josemaria
    ELECTRONICS, 2021, 10 (13)
  • [45] Internet of Things: Security Challenges for Next Generation Networks
    Gupta, KrishnaKanth
    Shukla, Sapna
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 315 - 318
  • [46] The Pervasive Trust Foundation for Security in Next Generation Networks
    Lilien, Leszek
    Al-Alawneh, Adawia
    Ben Othmane, Lotfi
    NEW SECURITY PARADIGMS WORKSHOP 2010, 2010, : 129 - 141
  • [47] Security in Next-Generation Wireless Sensor Networks
    Gao, Li-jie
    Chen, Zhi-gang
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109
  • [48] Dynamic Security Architecture for Next Generation Wireless Networks
    Youssef, Khaled Y.
    Hafez, Ahmed A.
    Zekry, Abdel Halim A.
    2012 SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES'2012), 2012, : 35 - 40
  • [49] Optimization and Security Issues for Next Generation Networks - Editorial
    Ogiela, Marek R.
    Xhafa, Fatos
    Barolli, Leonard
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 86 : 1 - 2
  • [50] Experiences in Planning and Implantation of Security at Next Generation Networks
    Baluja, W.
    Anias, C.
    IEEE LATIN AMERICA TRANSACTIONS, 2010, 8 (06) : 703 - 707