A Design of Authentication Protocol for a Limited Mobile Network Environment
|
|
- Helen Bell
- 5 years ago
- Views:
Transcription
1 Vol.29 (SecTech 2013), pp A Design of Authentication Protocol for a Limited Mobile Network Environment Minha Park 1,1, Yeog Kim 2, Okyeon Yi 3 1, 3 Dept. of Mathematics, Kookmin University, Korea, 2 Cryptography & Information Security Institute, Kookmin University, Korea, 1, 3 {mhpark, oyyi}@kookmin.ac.kr, 2 yeogkim@gmail.com Abstract. Many people demand more convenience and smarter service. Due to demand, smart devices have begun to take center stage in terms of portability and functionality in wireless environments, especially mobile communications. To provide secure service, authentication between networks and users devices is necessary with proper efficiency. In this paper, we propose an advanced authentication protocol to increase the efficiency of data memory usage during operation in various limited environments. This protocol should also solve the problems in the 3rd Generation Partnership Project Authentication and Key Agreement (3GPP-AKA) protocol. Keywords: 3GPP, authentication, AKA, efficiency 1 Introduction Today, smart devices have begun to take center stage in terms of portability and functionality in wireless environments, especially mobile communications. Communications services are usually provided in wireless environments, which are prone to security threats, such as forgery. To deal with these threats, wireless networks and users devices must confirm the legitimacy of the other through mutual authentication. Furthermore, authentication should be required to ensure efficient operation. For example, there is mutual authentication built into 3G networks: AKA [1]. A typical 3G network consists of mobile stations (MSs); a serving network (SN), which provides direct communications with MSs and shares home networks role of ensuring the efficiency of network operation; and home network (HN), which manage and authenticate MSs[2] [4]. These issues include 1) the increasing of SN bandwidth consumption and storage overhead due to many authentication vectors (AVs) needing authentication [2]; 2) the synchronization of SQN, which is used for fresh authentication [2], 3) a weakening of SN reliability [3], 4) and the invasion of MS privacy [4]. The proposed protocol considers efficiency and minimum data memory usage for smart devices and solves all of the above-mentioned problems. Consequently, it can be applied not just to 3G networks, but also to other This work was supported by the IT R&D program of MKE/KEIT [ , Development on spectrum efficient multiband WPAN system for smart home networks]. ISSN: ASTL Copyright 2013 SERSC
2 Vol.29 (SecTech 2013) environments that have limited resources. In Section 2, we arrange protocols, improved weakness of 3GPP-AKA. In Section 3, we describe the proposed protocol in detail. In Section 4, we compare existing protocols to the proposed protocol in terms of their solutions to problems and how data memory is used. The last section gives our conclusions. 2 Problem Deduction and its Solutions 2.1 Problems Raised in Earlier Studies and Improved Studies Table 1. Solutions to problems given in earlier studies. Problems Solutions Related Studies SN bandwidth consumption and storage overhead Using only one AV [2], [3], [4] Synchronization of SQN Using timestamps instead of SQN [2], [3], [4] Weakness of SN reliability Using SN information or random numbers [3], [4] Invasion of MS privacy Masking IMSI with secret tokens [4] 1) SN bandwidth consumption and storage overhead: Authentication is performed periodically to maintain the reliability of entities and the security of shared keys. In 3GPP-AKA, HN generates many AVs and sends them to SN, which use them without HN s extra permission. This process increases bandwidth consumption and SN storage overhead. [2], [3], and [4] use only one AV for solving this problem. 2) Synchronization of SQN: AVs are divided by SQN which provides freshness and they use different AV for each AKA procedure. Considering SQN s gap of MS and HN for movement of MS, MS checks whether it is within the reasonable range. If not, SQN and AVs are all updated by re-synchronization. Using timestamps instead of SQN solves this problem [2], [3], [4]. 3) Weakness of SN reliability: SN conducts authentication between MS and HN, and thus needs to be reliable. In 3GPP-AKA, since SN just delivers authentication value, it is difficult to trust SN. Generating SN authentication value [3] and using LAI (which is where SN is located) information [4] will help improve SN reliability. 4) Invasion of MS privacy: International mobile subscriber identity (IMSI) is sent in the clear to SN in order to check MS IDs, so the invasion of MS privacy can occur. Masking IMSI with secret tokens provides MS with privacy [4]. 2.2 Consideration of the Proposed Protocol Use minimum data memory: For operational efficiency, the proposed protocol reduces the usage of authentication values. Use only one AV: HN generates only one AV, which is sent to SNs. This reduces bandwidth consumption and SN storage, and also skips SQN comparisons. Use SN information: Using SN LAI improves SN reliability. 42 Copyright 2013 SERSC
3 Use MS TID (Temporary ID): After initial authentication, MS uses TIDs for privacy. 3 Proposed Protocol 3.1 Full Authentication Protocol Fig. 1. Full authentication and key protocol When an MS approaches to an SN, a full authentication is operated as the process described in Figure 1. After the full authentication, the SN sends MS s TID to the MS, which uses the TID for privacy. 4 Analysis of the Proposed Protocol Compared to Other Protocols 4.1 Comparison of Improvements Table 2 lists the improvements offered by several studies through the solving of 3GPP-AKA problems. The proposed protocol improves all of these areas, while the earlier studies only improved a few areas. Table 2. Lists of improvements List 3GPP- UMTS Kim- Proposed PE-AKA AKA X-AKA AKA AKA Reduce SN bandwidth consumption and Storage X O O O O Skip SQN synchronization X X O O O Provide MS privacy O - X O O Improve SN reliability X X O O O Suggest the authentication of handovers O O O O O
4 Vol.29 (SecTech 2013) 4.2 Analysis of Data Memory Usage Since we have shown the efficiency of the propose protocol, we will now analyze its data memory usage and data size, which are used to calculate MS, SN, and HN authentication. Table 3. Data memory usage and ratio Entities and Sections 3GPP-AKA UMTS X-AKA Kim-AKA PE-AKA Proposed AKA MS 688 5% % % % 656 MS SN % % % % 560 SN % % % % 576 SN HN 720 4% % % % 688 HN 688 5% % % % 656 Total % % % % 3136 Table 3 gives each entity and section s data memory usage (left side), as well as their ratio of consumption (right side), which shows the data memory usage changes compared to proposed protocol. The proposed protocol uses 37% data memory than the others. Consequently, the proposed protocol is more efficient than those of earlier studies. Therefore, according to the above analysis, the proposed protocol not only solves all design problems, but also takes into account data memory usage efficiency. 5 Conclusion The authentication of communications entities is necessary in radio environments, where many threats exist such as forgery, wiretapping. In this paper, we proposed a new protocol that increased efficiency, minimized data memory usage, and solved all 3GPP-AKA problems. For efficiency, the proposed protocol uses minimal authentication values and only one AV for decreasing bandwidth consumption and storage overhead, so SQN synchronization is not needed. It also uses SN LAI and MS TID for SN reliability and MS privacy. As a result, the proposed protocol can be expected to more efficient than other protocols, reducing data memory usage by 37%. The communication service can thus provide better service, as mutual authentication provides many functions and efficient data memory usage. References 1. 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security architecture (Release 5), 3GPP TS v5.7.0 ( ) 2. C. Huang and J. Li. Authentication and Key Agreement protocol for UMTS with low bandwidth consumption, Proceedings of the 19th International Conference on Advanced Information Networking and Application 2005, pp , Mar Copyright 2013 SERSC
5 3. D.Kim and S.Jung. Improved AKA Protocol for Efficient Management of Authentication Data in 3GPP Network, Korea Institute of Information Security & Cryptology Vol.19 No.2 April S.Jeon and S.Oh. An Efficient Authentication Mechanism Strengthen the Privacy Protection in 3G Network, Korea Academia Industrial Cooperation Society Vol.11 No.12 pp , 2010
NS-AKA: An Improved and Efficient AKA Protocol for 3G (UMTS) Networks
NS-AKA: An Improved and Efficient AKA Protocol for 3G (UMTS) Networks Neetesh Saxena, Narendra S. Chaudhari Abstract- In this paper, we propose an improved and efficient AKA protocol named NS-AKA to prevent
More informationDefeating IMSI Catchers. Fabian van den Broek et al. CCS 2015
Defeating IMSI Catchers Fabian van den Broek et al. CCS 2015 Ren-Jay Wang CS598 - COMPUTER SECURITY IN THE PHYSICAL ckground 3GPP 3GPP 3 rd Generation Partnership Project Encompasses: GSM and related 2G
More informationUSIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006
USIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006 Hyeyeon Kwon, Kyung-yul Cheon, Kwang-hyun Roh, Aesoon Park Electronics and Telecommunications Research Institute 161, Gajeong-dong,
More informationImproved One-Pass IP Multimedia Subsystem Authentication for UMTS
Improved One-Pass IP Multimedia Subsystem Authentication for UMTS Lili Gu RMIT University Melbourne, Australia l.gu@student.rmit.edu.au Abstract As defined in the 3GPP specifications, a UMTS user device
More informationImplementation of Enhanced AKA in LTE Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1124
More informationDesign and Implementation of Secure OTP Generation for IoT Devices
, pp.75-80 http://dx.doi.org/10.14257/astl.2017.146.15 Design and Implementation of Secure OTP Generation for IoT Devices Young-Sae Kim 1 and Jeong-Nyeo Kim 1 1 Electronics and Telecommunications Research
More informationDesigning Authentication for Wireless Communication Security Protocol
Designing Authentication for Wireless Communication Security Protocol Ms. Roshni Chandrawanshi, Prof. Ravi Mohan, Mr. Shiv Prakash Chandrawanshi Abstract Security is considered an important issue for mobile
More informationA Virtual-Synchronized-File Based Privacy Protection System
Vol.133 (Information Technology and Computer Science 2016), pp.29-33 http://dx.doi.org/10.14257/astl.2016. A Virtual-Synchronized-File Based Privacy Protection System Hye-Lim Jeong 1, Ki-Woong Park 2 System
More informationUNIVERSAL MOBILE TELECOMMUNICATIONS
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 6, JUNE 2005 1233 One-Pass GPRS and IMS Authentication Procedure for UMTS Yi-Bing Lin, Fellow, IEEE, Ming-Feng Chang, Meng-Ta Hsu, and Lin-Yi
More informationA Study on the IoT Sensor Interaction Transmission System based on BigData
Vol.123 (SoftTech 2016), pp.220-224 http://dx.doi.org/10.14257/astl.2016.123.41 A Study on the IoT Sensor Interaction Transmission System based on BigData Jin-Tae Park 1, Gyung-Soo Phyo 1 and Il-Young
More informationauthentication will be required between roaming user, visited network and home network.
Classification of Security Authentication for Roaming User in Mobile Networks Ja afer AL-Saraireh & Sufian Yousef j.al-saraireh@anglia.ac.uk, s.yousef@anglia.ac.uk Anglia Ruskin University Chelmsford UK
More informationKey Management Protocol for Roaming in Wireless Interworking System
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 59 Key Management Protocol for Roaming in Wireless Interworking System Taenam Cho, Jin-Hee Han and Sung-Ik
More informationON THE IMPACT OF GSM ENCRYPTION AND MAN-IN-THE-MIDDLE ATTACKS ON THE SECURITY OF INTEROPERATING GSM/UMTS NETWORKS
ON THE IMPACT OF GSM ENCRYPTION AND MAN-IN-THE-MIDDLE ATTACKS ON THE SECURITY OF INTEROPERATING GSM/UMTS NETWORKS Ulrike Meyer, Susanne Wetzel Darmstadt University of Technology, Department of Computer
More informationCity Research Online. Permanent City Research Online URL:
Komninos, N. & Dimitriou, T. (2006). Adaptive authentication and key agreement mechanism for future cellular systems. Paper presented at the 15th IST Mobile & Wireless Communications Summit, 04-08 June
More informationPrivate Identification, Authentication and Key Agreement Protocol with Security Mode Setup
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup Farshid Farhat, Somayeh Salimi, Ahmad Salahi ICT Security Faculty Iran Telecommunication Research Centre Tehran,
More informationApplication of ESA in the CAVE Mode Authentication
Application of ESA in the Mode Authentication Keonwoo Kim, Dowon Hong, and Kyoil Chung Abstract This paper proposes the authentication method using ESA algorithm instead of using algorithm in the CDMA
More informationRobust EC-PAKA Protocol for Wireless Mobile Networks
International Journal of Mathematical Analysis Vol. 8, 2014, no. 51, 2531-2537 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.410298 Robust EC-PAKA Protocol for Wireless Mobile Networks
More informationETSI TS V3.4.0 ( )
TS 133 103 V3.4.0 (2000-10) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G Security; Integration Guidelines (3GPP TS 33.103 version 3.4.0 Release 1999) 1 TS 133 103 V3.4.0
More informationSecure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography.
Secure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography T K Mohanta 1, R K Samantaray 2, S Panda 3 1. Dept.of Electronics & Communication.Engg, Sudhananda Engg & Research
More informationAnalysis and Modeling of False Synchronizations in 3G- WLAN Integrated Networks
Analysis and Modeling of False Synchronizations in 3G- WLAN Integrated Networks Christoforos Ntantogian 1, Christos Xenakis 1, Ioannis Stavrakakis 2 1 Department of Digital Systems, University of Piraeus,
More informationETSI TS V3.5.0 ( )
TS 133 102 V3.5.0 (2000-07) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G Security; Security Architecture (3G TS 33.102 version 3.5.0 Release 1999) 1 TS 133 102 V3.5.0 (2000-07)
More informationAnalysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service
PUBLISHED IN: PROCEEDINGS OF THE EUROPEAN WIRELESS 2006 CONFERENCE 1 Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service George Xylomenos, Konstantinos Katsaros
More informationThe Modified Scheme is still vulnerable to. the parallel Session Attack
1 The Modified Scheme is still vulnerable to the parallel Session Attack Manoj Kumar Department of Mathematics, Rashtriya Kishan (P.G.) College Shamli- Muzaffarnagar-247776 yamu_balyan@yahoo.co.in Abstract
More informationPartial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network
, pp.106-110 http://dx.doi.org/10.14257/astl.2014.51.25 Partial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network Backhyun Kim and Iksoo Kim 1 Faculty of Liberal Education, Incheon National
More informationBuilding Ubiquitous Computing Environment Using the Web of Things Platform
, pp.105-109 http://dx.doi.org/10.14257/astl.2013 Building Ubiquitous Computing Environment Using the Web of Things Platform Woo-Chang Shin Dept. of Computer Science, at SeoKyeong University 16-1 Jungneung-Dong
More informationEfficient GSM Authentication and Key Agreement Protocols with Robust User Privacy Protection
Efficient GSM Authentication and Key Agreement Protocols with Robust User Privacy Protection Author: Jing-Lin Wu, Wen-Shenq Juang and Sian-Teng Chen Department of Information Management, Shih Hsin University,
More informationDiminishing Signaling Traffic for Authentication in Mobile Communication System
Diminishing Signaling Traffic for Authentication in Mobile Communication System Chi-Chun Lo and Kuen-Liang Sue Institute of Information Management National Chiao Tung University Hsinchu, Taiwan cclo@cc.nctu.edu.tw,
More informationCryptanalysis and Improvement of a New. Ultra-lightweight RFID Authentication. Protocol with Permutation
Applied Mathematical Sciences, Vol. 7, 2013, no. 69, 3433-3444 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.211587 Cryptanalysis and Improvement of a New Ultra-lightweight RFID Authentication
More informationSecurity functions in mobile communication systems
Security functions in mobile communication systems Dr. Hannes Federrath University of Technology Dresden Security demands Security functions of GSM Known attacks on GSM Security functions of UMTS Concepts
More informationFederated access service authorization
Federated access service authorization MIKKO NIIRANEN and PREETIDA VINAYAKRAY-JANI Nokia Reseach Center Itämerenkatu 11-13 00180 Helsinki FINLAND Abstract: - The increasing variety of access technologies
More informationApplication of Fuzzy Logic Control to Dynamic Channel Allocation of WiMedia UWB Networks
, pp.60-64 http://dx.doi.org/10.14257/astl.2015.108.14 Application of Fuzzy Logic Control to Dynamic Channel Allocation of WiMedia UWB Networks Dong-Keun Jeon 1, Yeonwoo Lee *2 1 Dept. of Mechatronics,
More informationImproved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks
, pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of
More informationQoS based vertical handoff method between UMTS systems and wireless LAN networks
QoS based vertical handoff method between UMTS systems and wireless LAN networks Sungkwan Jung and Dong-ho Cho Div. of EE, Dept. of EECS Korea Advanced Institute of Science and Technology Daejeon, Rep.
More informationQuestioning the Feasibility of UMTS GSM Interworking Attacks
Questioning the Feasibility of UMTS GSM Interworking Attacks Christoforos Ntantogian 1, Christos Xenakis 2 1 Department of Informatics and Telecommunications, University of Athens, Greece 2 Department
More informationUMTS System Architecture and Protocol Architecture
UMTS System Architecture and Protocol Architecture Overview on overall system architecture UMTS network architecture and elements Mobile station High-level functions UMTS domains and strata UMTS/GPRS protocol
More informationEFFICIENT MECHANISM FOR THE SETUP OF UE-INITIATED TUNNELS IN 3GPP-WLAN INTERWORKING. 1. Introduction
Trends in Mathematics Information Center for Mathematical Sciences Volume 8, Number 1, June, 2005, Pages 77 85 EFFICIENT MECHANISM FOR THE SETUP OF -INITIATED TUNNELS IN 3GPP-WLAN INTERWORKING SANG UK
More informationSecurity Enhanced IEEE 802.1x Authentication Method for WLAN Mobile Router
Security Enhanced IEEE 802.1x Method for WLAN Mobile Router Keun Young Park*, Yong Soo Kim*, Juho Kim* * Department of Computer Science & Engineering, Sogang University, Seoul, Korea kypark@sogang.ac.kr,
More informationCryptanalysis on Efficient Two-factor User Authentication Scheme with Unlinkability for Wireless Sensor Networks
Cryptanalysis on Efficient Two-factor User Authentication Scheme with Unlinkability for Wireless Sensor Networks Hae-Won Choi 1, Hyunsung Kim 2,3, 1 Department of Computer Engineering, Kyungwoon University,
More informationNew Privacy Issues in Mobile Telephony: Fix and Verification
New Privacy Issues in Mobile Telephony: Fix and Verification Myrto Arapinis, Loretta Mancini, Eike Ritter, Mark Ryan, Kevin Redon, Nico Golde, Ravi Borgaonkar CCS 2012, Raleigh, NC October 2012 In my bag
More informationCryptanalysis of a Markov Chain Based User Authentication Scheme
Cryptanalysis of a Markov Chain Based User Authentication Scheme Ruhul Amin, G.P. Biswas Indian School of Mines, Dhanbad Department of Computer Science & Engineering Email: amin ruhul@live.com, gpbiswas@gmail.com
More informationCryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards
Journal of Computational Information Systems 9: 14 (2013) 5513 5520 Available at http://www.jofcis.com Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart
More informationDesign of Secure End-to-End Protocols for Mobile Systems. Nepean, PO Box 10, Kingswood, NSW 2747, Australia. conclusions. 2.
Wireless '96 Design of Secure End-to-End Protocols for Mobile Systems Vijay Varadharajan and Yi Mu Department of Computing, University of Western Sydney, Nepean, PO Box 10, Kingswood, NSW 2747, Australia
More informationLTE Security How Good Is It?
SESSION ID: TECH-RO3 LTE Security How Good Is It? Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology @jchonski Joshua Franklin IT Specialist (Security) National Institute
More informationA Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System
, pp.197-202 http://dx.doi.org/10.14257/astl.2014.51.45 A Study on Development of Azimuth Angle Tracking Algorithm for Tracking-type Floating Photovoltaic System Young-Kwan Choi 1,1, In-Soo Kim 1, Sung-Taek
More informationCausal Order Multicast Protocol Using Different Information from Brokers to Subscribers
, pp.15-19 http://dx.doi.org/10.14257/astl.2014.51.04 Causal Order Multicast Protocol Using Different Information from Brokers to Subscribers Chayoung Kim 1 and Jinho Ahn 1, 1 Dept. of Comp. Scie., Kyonggi
More informationGPRS Security for Smart Meters
GPRS Security for Smart Meters Martin Gilje Jaatun 1, Inger Anne Tøndel 1, and Geir M. Køien 2 1 Department of Software Engineering, Safety and Security SINTEF ICT NO-7465 Trondheim, Norway {martin.g.jaatun,inger.a.tondel}@sintef.no
More informationCross-layer Optimized Vertical Handover Schemes between Mobile WiMAX and 3G Networks
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 2, NO. 4, AUGUST 2008 171 Copyright c 2008 KSII Cross-layer Optimized Vertical Handover Schemes between Mobile WiMAX and 3G Networks Jaeho Jo
More informationM2MD Communications Gateway: fast, secure, efficient
Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.
More information3GPP security. Valtteri Niemi 3GPP SA3 (Security) chairman Nokia
3GPP security Valtteri Niemi 3GPP SA3 (Security) chairman Nokia 1 Some history and background 2 Some history 1/2 SA3 took over the responsibility of specifications created by ETSI SMG10, e.g. TS 43.020
More informationETSI TS V (201
TS 133 187 V12.2.0 (201 15-04) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Security aspects of Machine-Type Communications
More informationBasic SAE Management Technology for Realizing All-IP Network
LTE SAE EPC Special Articles on SAE Standardization Technology Basic SAE Management Technology for Realizing All-IP Network The standardization of 3GPP Release 8 brings new provisions for All-IP networks
More informationFall 2010/Lecture 32 1
CS 426 (Fall 2010) Key Distribution & Agreement Fall 2010/Lecture 32 1 Outline Key agreement without t using public keys Distribution of public keys, with public key certificates Diffie-Hellman Protocol
More informationNetwork Working Group Request for Comments: 3310 Category: Informational V. Torvinen Ericsson September 2002
Network Working Group Request for Comments: 3310 Category: Informational A. Niemi Nokia J. Arkko V. Torvinen Ericsson September 2002 Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication
More informationSecurity Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement
Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement Young-Hwa An* * Division of Computer and Media Information Engineering, Kangnam University 111, Gugal-dong,
More informationDevelopment of Smart-CITY Based Convergent Contents Platform Using Bluetooth Low Energy Beacon Sensors
, pp.16-20 http://dx.doi.org/10.14257/astl.2017.145.04 Development of Smart-CITY Based Convergent Contents Platform Using Bluetooth Low Energy Beacon Sensors Jihoon Seo 1 and Kil-Hong Joo 2* 1 HI-CUBE,
More informationImplementation of a Dual-Mode SDR Smart Antenna Base Station Supporting WiBro and TDD HSDPA
Implementation of a Dual-Mode SDR Smart Antenna Base Station Supporting WiBro and TDD HSDPA Jongeun Kim, Sukhwan Mun, Taeyeol Oh,Yusuk Yun, Seungwon Choi 1 HY-SDR Research Center, Hanyang University, Seoul,
More informationA Centralized Approaches for Location Management in Personal Communication Services Networks
A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,
More informationDesign of Secure End-to-End Protocols for Mobile Systems
26 Design of Secure End-to-End Protocols for Mobile Systems V. Varadharajan and Y. Mu Department of Computing, University of Western Sydney, Nepean, PO Box 10, Kingswood, NSW 2747, Australia Telephone:
More informationUbiquitous One-Time Password Service Using Generic Authentication Architecture
Ubiquitous One-Time Password Service Using Generic Authentication Architecture Chunhua Chen 1, Chris J. Mitchell 2, and Shaohua Tang 3 1,3 School of Computer Science and Engineering South China University
More informationETSI TR V ( )
TR 131 900 V14.0.0 (2017-04) TECHNICAL REPORT Universal Mobile Telecommunications System (UMTS); LTE; SIM/USIM internal and external interworking aspects (3GPP TR 31.900 version 14.0.0 Release 14) 1 TR
More informationA Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion
A obile Device Classification echanism for Efficient Prevention of Wireless Intrusion Hyeokchan Kwon 1, Sin-Hyo Kim 1, 1 Electronics and Telecommunications Research Institue, 218 Gajeong-ro, Yuseong-gu,
More informationNetwork Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013
Network Security: Cellular Security Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2013 Outline Cellular networks GSM security architecture and protocols Counters UMTS AKA and session
More informationRealtime C&C Zeus Packet Detection Based on RC4 Decryption of Packet Length Field
, pp.55-59 http://dx.doi.org/10.14257/astl.2014.64.14 Realtime C&C Zeus Packet Detection Based on RC4 Decryption of Packet Length Field ChulWoo Park 1, HyoSung Park 1, KiChang Kim 1 1 Information and Communication
More informationSecured Cost Effective Group based Handover Authentication Scheme for Mobile WiMAX Networks
Secured Cost Effective Group based Handover Authentication Scheme for Mobile WiMAX Networks Mohanaprasanth.P PG Student Department of Electronics & Communication Engineering, Velammal College of Engineering
More informationDelegation Scheme based on Proxy Re-encryption in Cloud Environment
Vol.133 (Information Technology and Computer Science 2016), pp.122-126 http://dx.doi.org/10.14257/astl.2016. Delegation Scheme based on Proxy Re-encryption in Cloud Environment You-Jin Song Department
More informationAn Efficient Flow Table Management Scheme for SDNs Based On Flow Forwarding Paths
, pp.88-93 http://dx.doi.org/10.14257/astl.2016.135.23 An Efficient Flow Table Management Scheme for SDNs Based On Flow Forwarding Paths Dongryeol Kim, Byoung-Dai Lee Kyonggi university, Department of
More informationA Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks
A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks Mary Wu 1, ChongGun Kim 1 1*, HeeJoo park 1 Dept. of Computer Eng., Yeungnam Univ., Korea Dept. of Cyber Security., Kyungil
More informationSource Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network
Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,
More informationAn Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage
, pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2
More informationWireless Security Security problems in Wireless Networks
Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security
More informationA Personal Information Retrieval System in a Web Environment
Vol.87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents 2015), pp.42-46 http://dx.doi.org/10.14257/astl.2015.87.10 A Personal Information Retrieval System in a Web Environment YoungDeok
More informationDesign of a Processing Structure of CNN Algorithm using Filter Buffers
, pp.37-41 http://dx.doi.org/10.14257/astl.2016.129.08 Design of a Processing Structure of CNN Algorithm using Filter Buffers Kwan-Ho Lee 1, Jun-Mo Jeong 2, Jong-Joon Park 3 1 Dept. of Electronics and
More informationA Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks
, pp.147-151 http://dx.doi.org/10.14257/astl.2015.117.35 A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks Ronnie Caytiles, Seungyong Shin, Minji Yang and Byungjoo
More informationSecurity Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards
Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Younghwa An Computer Media Information Engineering, Kangnam University, 111, Gugal-dong, Giheung-gu, Yongin-si,
More informationA Review of 3G-WLAN Interworking
A Review of 3G-WLAN Interworking B.Bindusha Reddy #, Dr Syed Umar *, M.Satya Anusha & *Assistant. Professor, Department of ECM, KL University, A.P., INDIA. #, & Student, Department of ECM, KL University,
More informationSecure Data De-Duplication With Dynamic Ownership Management In Cloud Storage
Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,
More informationETSI TR V1.1.1 ( )
Technical Report Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Organization of user data 2 Reference DTR/TISPAN-02027-NGN-R1 Keywords architecture,
More informationA Study on Effective Hash Routing in MANET
, pp.47-54 http://dx.doi.org/10.14257/astl.2015.95.10 A Study on Effective Hash Routing in MANET Cheol-seung Lee Dept. of Teacher Tranining & Liberal Arts, Kwangju Women's University 201 Yeodai-Gil, Gwangsna-Gu,
More informationWhy IIJ Seeks to Become a Full MVNO
2. Focused Research (1) Why IIJ Seeks to Become a Full MVNO 2.1 MVNO Business Models In 2018, IIJ finally begins full MVNO services, the biggest challenge we have had since launching our MVNO business
More informationFederated Identity Management and Network Virtualization
Federated Identity Management and Network Virtualization Yang Cui and Kostas Pentikousis 3rd ETSI Future Networks Workshop 10 April 2013 Sophia Antipolis, France The opinions expressed in this presentation
More informationDelay Reduced MAC Protocol for Bio Signal Monitoring in the WBSN Environment
, pp.42-46 http://dx.doi.org/10.14257/astl.2015.94.10 Delay Reduced MAC Protocol for Bio Signal Monitoring in the WBSN Environment Rae Hyeon Kim, Jeong Gon Kim 1 Department of Electronic Engineering Korea
More informationSecurity Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
An abridged version of this paper appears in the Proc. of the Third IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island,
More informationResearch on Autonomic Control System Connection Goal-model and Fault-tree
, pp.47-53 http://dx.doi.org/10.14257/astl.2016.129.10 Research on Autonomic Control System Connection Goal-model and Fault-tree Dongbeom Ko 1, Teayoung Kim 1, Sungjoo Kang 2, Ingeol Chun 2, Jeongmin Park
More informationChapter 13 Location Privacy
Chapter 13 Location Privacy Security aspects of mobile communication Implicit addressing Pseudonyms Communication mixes [NetSec], WS 2007/2008 13.1 Security Aspects of Mobile Communication Mobile communication
More informationSecure 3G user authentication in ad-hoc serving networks
Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2005 Secure 3G user authentication in ad-hoc serving networks Lyn L. Evans Louisiana State University and Agricultural
More informationA Preliminary Study on Daylighting Performance of Light Shelf according to the Depth of Space
, pp.70-74 http://dx.doi.org/10.14257/astl.2013.32.17 A Preliminary Study on Daylighting Performance of Light Shelf according to the Depth of Space Heangwoo Lee 1.1, Janghoo Seo 2.1, Yongseong Kim 2.2,
More informationA Study on Secure SDLC Specialized in Common Criteria
, pp.19-23 http://dx.doi.org/10.14257/astl.2015.93.05 A Study on Secure SDLC Specialized in Common Criteria Min-Gyu Lee 1, Hyo-jung Sohn 2, Baek-MinSeong 3 and Jong-Bae Kim 4* 1,2,3,4* Graduate School
More informationByte Index Chunking Approach for Data Compression
Ider Lkhagvasuren 1, Jung Min So 1, Jeong Gun Lee 1, Chuck Yoo 2, Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea {Ider555, jso, jeonggun.lee, yuko}@hallym.ac.kr 2
More information5G SIM: Maximising MNO Investment in 5G Networks
5G SIM: Maximising MNO Investment in 5G Networks MNO migration to 5G has begun 67 Mobile Network Operators (MNOs) in 39 countries have announced 5G availability between 2018 and 2022 Source: GSA 1.36 billion
More informationA Review on Security in Smart Grids
International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) A Review on Security in Smart Grids Jeetu Sharma, Partha Pratim Bhattacharya and V K Jain College
More informationA Two-Fold Authentication Mechanism for Network Security
Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1
More informationETSI TS V (201
TS 123 101 V13.0.0 (201 16-01) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); General Universal Mobile Telecommunications System (UMTS) architecture (3GPP TS 23.101 version
More informationTrust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks
Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks Han Sang Kim, Jin Wook Lee*, Sandeep K. S. Gupta and Yann-Hang Lee Department of Computer Science and Engineering Arizona
More informationSurvey of security features in LTE Handover Technology
Scientific Research Journal (SCIRJ), Volume III, Issue VIII, August 2015 27 Survey of security features in LTE Handover Technology Md Mehedi Masud Department of Computer Science and Technology University
More informationAn OPNET Modeler Simulation Study of the VISA Protocol for Multi-Network Authentication
An OPNET Modeler Simulation Study of the VISA Protocol for Multi-Network Authentication Aarti Bharathan, Janise McNair Wireless & Mobile Systems Laboratory Electrical & Computer Engineering University
More informationM2MD Communications Gateway: fast, secure and efficient
Solution Brief M2MD Communications Gateway: fast, secure and efficient Key Benefits G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular
More informationMobile Agent Driven Time Synchronized Energy Efficient WSN
Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,
More informationWireless Network Security
Wireless Network Security Wireless LAN Security Slide from 2 nd book 1 802.11 Wireless LAN Security Stations in LAN are connected physically while in WLAN any station in the radio range is connected, so
More informationPrevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing
Ashish Sharma et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4), 14, 51-55 Prevention of Black Hole Attack in Routing Algorithm of MANET Using Trust Based
More informationA Load Balancing Scheme for Games in Wireless Sensor Networks
, pp.89-94 http://dx.doi.org/10.14257/astl.2013.42.21 A Load Balancing Scheme for Games in Wireless Sensor Networks Hye-Young Kim 1 1 Major in Game Software, School of Games, Hongik University, Chungnam,
More information