Distributed Security Architecture for Authentication in 4G Networks

被引:0
|
作者
Niranjani, D. [1 ]
Durga, M. Ganaga [1 ]
机构
[1] Bharathiar Univ, Coimbatore, Tamil Nadu, India
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
4G network is the highly advanced wireless network which aids broadband as well as multimedia applications. 4G uses the TCP/IP architecture as the network backbone with open interfaces, which makes it susceptible to various network security risks. The increased set of features available at the user terminal also leads to the maximization of the security risks in 4G network. Hence, to overcome the security problems in the 4G network, in this paper we propose to develop distributed security architecture for authentication. In this proposed architecture, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used for authenticating the mobile nodes within the network through hop by hop authentication and neighbor authentication.
引用
收藏
页码:286 / 291
页数:6
相关论文
共 50 条
  • [41] An agent-based architecture for handover initiation and decision in 4G networks
    Zafeiris, VE
    Giakoumakis, EA
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 72 - 77
  • [42] The research on robust detection method for mixed network architecture in 4G networks
    Chen Hui-min
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 2320 - 2323
  • [43] A-cell: a novel multi-hop architecture for 4G and 4G+wireless networks
    Safwat, A
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2931 - 2935
  • [44] Security scheme for 4G wireless systems
    Zheng, Y
    He, DK
    Xu, LX
    Tang, XH
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 397 - 401
  • [45] MUSE: A vision for 4G service and architecture
    Yang, J
    Ping, Z
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 4842 - 4845
  • [46] Mobile Networks Beyond 4G
    Frank, Hilary
    WORLD CONGRESS ON ENGINEERING, WCE 2015, VOL I, 2015, : 649 - 652
  • [47] Cyber security considerations of 4G mobile networks as a commuication service in smart grid
    Rahmani, Masoomeh
    Mozafari, Azam
    Pedramnia, Kiana
    2021 11TH SMART GRID CONFERENCE (SGC), 2021, : 305 - 309
  • [48] A security architecture for attacks detection and authentication in wireless mesh networks
    Parveen Kumar Sharma
    Rajiv Mahajan
    Cluster Computing, 2017, 20 : 2323 - 2332
  • [49] A security architecture for attacks detection and authentication in wireless mesh networks
    Sharma, Parveen Kumar
    Mahajan, Rajiv
    Surender
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2323 - 2332
  • [50] How Voice Call Technology Poses Security Threats in 4G LTE Networks
    Tu, Guan-Hua
    Li, Chi-Yu
    Peng, Chunyi
    Lu, Songwu
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 442 - 450