A Console GRID LA Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE

by   Rajakumar Arul, et al.

The growing popularity of multimedia applications, pervasive connectivity, higher bandwidth, and euphoric technology penetration among the bulk of the human race that happens to be cellular technology users, has fueled the adaptation to Long Term Evolution (LTE)/ System Architecture Evolution (SAE). The LTE fulfills the resource demands of the next generation applications for now. We identify security issues in the authentication mechanism used in LTE that without countermeasures might give superuser rights to unauthorized users. The LTE uses static LTE Key (LTE-K) to derive the entire key hierarchy such as LTE follows Evolved Packet System-Authentication and Key Agreement (EPS-AKA) based authentication which discloses user identity, location, and other Personally Identifiable Information (PII). To counter this, we propose a public key cryptosystem named International mobile subscriber identity Protected Console Grid-based Authentication and Key Agreement (IPG-AKA) protocol to address the vulnerabilities related to weak key management. From the data obtained from threat modeling and simulation results, we claim that the IPG-AKA scheme not only improves the security of authentication procedures, it also shows improvements in authentication loads and reduction in key generation time. The empirical results and qualitative analysis presented in this paper proves that IPG-AKA improves security in authentication procedure and performance in the LTE.



There are no comments yet.


page 10

page 12


A Quantum Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario

Millions of devices are going to participate in 5G producing a huge spac...

Zero-Knowledge Authentication

In the thesis we focus on designing an authentication system to authenti...

NIMSA: Non-Interactive Multihoming Security Authentication Scheme for vehicular communications in Mobile Heterogeneous Networks

In vehicular communications, in-vehicle devices' mobile and multihoming ...

Dynamic Anonymized Evaluation for Behavioral Continuous Authentication

Emerging technology demands reliable authentication mechanisms, particul...

An Energy Efficient Authentication Scheme using Chebyshev Chaotic Map for Smart Grid Environment

As one of the important applications of Smart grid, charging between ele...

Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come

User authentication can rely on various factors (e.g., a password, a cry...

Security and Protocol Exploit Analysis of the 5G Specifications

The Third Generation Partnership Project (3GPP) released its first 5G se...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.