[Show abstract][Hide abstract] ABSTRACT: In this paper, we propose a handover authentication mechanism, called handover key management and authentication scheme (HaKMA),
which as a three-layer authentication architecture is a new version of our previous work Diffie-Hellman-PKDS-based authentication
method (DiHam for short) by improving its key generation flow and adding a handover authentication scheme to respectively
speed up handover process and increase the security level for mobile stations (MS). AAA server supported authentication is
also enhanced by involving an improved extensible authentication protocol (EAP). According to the analyses of this study,
the HaKMA is more secure than the compared schemes, including the PKMv2 and DiHam.
International Conference on Multidisciplinary Research and Practice for Business, Enterprise and Health Information Systems - MURPBES 2011 / Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings; 01/2011
[Show abstract][Hide abstract] ABSTRACT: In broadband wireless technology, due to having many salient advantages, such as high data rates, quality of service, scalability, security, mobility, etc., LTE-A currently has been one of the trends of wireless system development. This system provides several sophisticated authentication and encryption techniques to enhance its system security. However, LTE-A still suffers from various attacks, like eavesdropping and replay attacks. Therefore, in this paper, we propose a novel security scheme, called the security system for a 4G
environment (Se4GE for short), which as an LTE-A-based system integrates the RSA and Diffie–Hellman algorithms to solve some of LTE-A’s security drawbacks where LTE-A stands for LTE-Advance which is a 4G system. The Se4GE is an end-to-end ciphertext transfer mechanism which dynamically changes encryption keys to enforce the security of data transmission in an LTE-A system. The Se4GE also produces several logically connected random keys, called the intelligent protection-key chain, which invokes two encryption/decryption techniques to provide users with broader demands for security services. The analytical results show that the Se4GE has higher security level than that of an LTE-A system.
The Journal of Supercomputing 03/2014; · 0.92 Impact Factor
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.