A secure wireless communication system integrating RSA, Diffie---Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment

作者: Yi-Li) Huang , YL (Huang , Fang-Yie) Leu , FY (Leu , Ilsun) You

DOI: 10.1007/S11227-013-0958-Z

关键词: Covert channelEncryptionSecurity serviceComputer networkSecurity levelComputer securityData securityReplay attackComputer security modelSecurity associationAuthenticationDiffie–Hellman key exchangeComputer scienceNetwork Access ControlDistributed System Security ArchitectureCloud computing securityCiphertext

摘要: In broadband wireless technology, due to having many salient advantages, such as high data rates, quality of service, scalability, security, mobility, etc., LTE-A currently has been one the trends system development. This provides several sophisticated authentication and encryption techniques enhance its security. However, still suffers from various attacks, like eavesdropping replay attacks. Therefore, in this paper, we propose a novel security scheme, called for 4G environment (Se4GE short), which an LTE-A-based integrates RSA Diffie---Hellman algorithms solve some LTE-A's drawbacks where stands LTE-Advance is system. The Se4GE end-to-end ciphertext transfer mechanism dynamically changes keys enforce transmission also produces logically connected random keys, intelligent protection-key chain, invokes two encryption/decryption provide users with broader demands services. analytical results show that higher level than

参考文章(24)
Akhil Kaushik, Extended Diffie-Hellman Algorithm for Key Exchange and Management International Journal of Advances in Engineering Sciences. ,vol. 3, pp. 67- 70 ,(2013)
Yi-Bing Lin, Shie-Yuan Wang, NCTUns network simulation and emulation for wireless resource management: Research Articles communications and mobile computing. ,vol. 5, pp. 899- 916 ,(2005) , 10.1002/WCM.V5:8
Doo Hwan Lee, K. Kyamakya, J.P. Umondi, Fast handover algorithm for IEEE 802.16e broadband wireless access system international symposium on wireless pervasive computing. pp. 1- 6 ,(2006) , 10.1109/ISWPC.2006.1613600
Hugo Krawczyk, Perfect Forward Secrecy. Encyclopedia of Cryptography and Security (2nd Ed.). pp. 921- 922 ,(2005)
H. Haddad, H. Mirmohamadi, Comparative evaluation of successor protocols to Internet key exchange (IKE) international conference on industrial informatics. pp. 692- 696 ,(2005) , 10.1109/INDIN.2005.1560459
Abraham George, Anup Kumar, Dave Cavalcanti, Dharma P. Agrawal, Protocols for mobility management in heterogeneous multi-hop wireless networks Pervasive and Mobile Computing. ,vol. 4, pp. 92- 116 ,(2008) , 10.1016/J.PMCJ.2007.03.002
Fang-Yie Leu, Ilsun You, Yi-Li Huang, Kangbin Yim, Cheng-Ru Dai, Improving security level of LTE authentication and key agreement procedure global communications conference. pp. 1032- 1036 ,(2012) , 10.1109/GLOCOMW.2012.6477719
Min-Ho Park, Seung-Woo Seo, A Pseudonym Assignment for the Last Mile Wireless Access to 4G Networks global communications conference. pp. 1- 6 ,(2007) , 10.1109/GLOCOMW.2007.4437782
Stefan Parkvall, David Astely, The Evolution of LTE towards IMT-Advanced Journal of Communications. ,vol. 4, pp. 146- 154 ,(2009) , 10.4304/JCM.4.3.146-154
Shie-Yuan Wang, Yi-Bing Lin, NCTUns network simulation and emulation for wireless resource management Wireless Communications and Mobile Computing. ,vol. 5, pp. 899- 916 ,(2005) , 10.1002/WCM.354