A green and secure authentication for the 4th generation mobile network

作者: Lili Gu , Mark A Gregory

DOI: 10.1109/ATNAC.2011.6096633

关键词: Multi-factor authenticationComputer scienceGeneric Bootstrapping ArchitectureChallenge-Handshake Authentication ProtocolAuthentication protocolLightweight Extensible Authentication ProtocolComputer networkData Authentication AlgorithmNetwork Access ControlSSLIOP

摘要: The 4th generation (4G) mobile access network and the core are evolving towards a secure, fast, Internet Protocol-based network. With emergence of next battery-powered smart phone open source application platforms, security terminal's energy consumption have become big issues. Long Term Evolution (LTE) is one most popular 4G technologies defined by 3rd Generation Partnership Projects (3GPP). It observed that end user requires two authentication steps to multimedia services. first LTE layer authentication, second IP Multimedia Subsystem (IMS) service authentication. utilize carried out using Authentication Key Agreement (AKA) protocol. This paper proposes an Improved AKA (I-AKA) protocol which authenticates on both without double execution simplifies steps. Furthermore, were analyzed results showed proposed I-AKA could save up 81.82% related with increased security.

参考文章(33)
Sergiy Butenko, Xiuzhen Cheng, Carlos A. Oliveira, P. M. Pardalos, A New Heuristic for the Minimum Connected Dominating Set Problem on Ad Hoc Wireless Networks Springer, Boston, MA. pp. 61- 73 ,(2004) , 10.1007/978-1-4613-0219-3_4
S. Basagni, Distributed clustering for ad hoc networks international symposium on parallel architectures algorithms and networks. pp. 310- 315 ,(1999) , 10.1109/ISPAN.1999.778957
Israel Cidon, Osnat Mokryn, Propagation and Leader Election in a Multihop Broadcast Environment international symposium on distributed computing. pp. 104- 118 ,(1998) , 10.1007/BFB0056477
R. Atkinson, S. Kent, IP Encapsulating Security Payload (ESP) RFC. ,vol. 1827, pp. 1- 12 ,(1995)
Stefano Basagni, Chiara Petrioli, Roberto Petroccia, Efficiently reconfigurable backbones for wireless sensor networks Computer Communications. ,vol. 31, pp. 668- 698 ,(2008) , 10.1016/J.COMCOM.2007.10.032
Ya Xu, John Heidemann, Deborah Estrin, Geography-informed energy conservation for Ad Hoc routing Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01. pp. 70- 84 ,(2001) , 10.1145/381677.381685
Dawei Xia, Natalija Vlajic, Near-Optimal Node Clustering in Wireless sensor Networks for Environment Monitoring advanced information networking and applications. pp. 632- 641 ,(2007) , 10.1109/AINA.2007.97
Christoforos Ntantogian, Christos Xenakis, One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks Wireless Personal Communications. ,vol. 48, pp. 569- 584 ,(2009) , 10.1007/S11277-008-9548-4
C.-M. Huang, J.-W. Li, Efficient and Provably Secure IP Multimedia Subsystem Authentication for UMTS The Computer Journal. ,vol. 50, pp. 739- 757 ,(2007) , 10.1093/COMJNL/BXM029
Sajid Hussain, Mubashsharul I Shafique, Laurence T Yang, Constructing a CDS-Based Network Backbone for Energy Efficiency in Industrial Wireless Sensor Networks high performance computing and communications. pp. 322- 328 ,(2010) , 10.1109/HPCC.2010.96