DocumentCode
600023
Title
Mutual authentication protocol for LTE based mobile networks
Author
Naqash, Talha ; Yasin, Ahmad ; Hasan, M. Anwar ; Mujhaid, U. ; Ishfaq, Ahsan ; Najam-ul-islam, M. ; Shabir, Kashif ; Mehmood, Huzaifa
Author_Institution
Dept. of GS & AS, Bahria Univ., Islamabad, Pakistan
fYear
2012
fDate
20-22 Dec. 2012
Firstpage
1
Lastpage
4
Abstract
Femtocells are used to enhance the service coverage inside the office or home, particularly where access is narrow or engaged. Femtocells enhance the service quality that is attractive for the client and the mobile operator. Currently, security of core network from the unauthorized user in public environment is a big issue and there is no integrated solution to verify a rouge femtocell or unauthorized user equipment (UE). Forged equipment can launch any attack or hack the core network to act actively or passively. Hence, there is a need for a mutual authentication protocol, so communication equipments can verify each other during connection establishment and make a secure tunnel for communication. In this paper we have critically analyzed the Rapid Development Authentication Protocol (RDAP) and its structural design. Then a novel protocol has been proposed which provide mutual authentication between User Equipment (UE) and femtocell that will make the system more secure than conventional RDAP. Moreover, novel scheme is also compatible with the current network architecture and resist various network attacks e.g., Sybil attack, MITM, DOS, Eavesdropping & Injecting attack and Packet Sniffing.
Keywords
Long Term Evolution; cryptographic protocols; femtocellular radio; mobile communication; telecommunication security; DOS attack; LTE based mobile network; MITM attack; RDAP protocol; Sybil attack; denial-of-service attack; eavesdropping-and-injecting attack; femtocells; long term evolution; man-in-the-middle attack; mutual authentication protocol; network security; packet sniffing attack; rapid development authentication protocol; service coverage; service quality; unauthorized user equipment; Authentication; Educational institutions; Encryption; Femtocells; Mobile communication; Protocols; Visualization; development authentication protocol (rdap); long term evolution (lte); mutual authentication (ma);
fLanguage
English
Publisher
ieee
Conference_Titel
Open Source Systems and Technologies (ICOSST), 2012 International Conference on
Conference_Location
Lahore
Print_ISBN
978-1-4673-3094-7
Type
conf
DOI
10.1109/ICOSST.2012.6472836
Filename
6472836
Link To Document