Towards security architecture for Home (evolved) NodeB: challenges, requirements and solutions

In this paper, we evaluate the options for a viable security architecture for the 3GPP Home (evolved) NodeB (H(e)NB) and present the trade-off between the level of security provided and the associated cost of a H(e)NB device. Low cost of the H(e)NB device is one of the key factors to achieve high market penetration and the major contributor to the cost of the H(e)NB device is the security architecture. It is of interest to analyse the security challenges, security requirements and security mechanisms for (i) H(e)NB authentication, (ii) provisioning of security credentials, (iii) backhaul link protection, (iv) location verification and (v) user access control in the H(e)NB. It is required that the H(e)NB architecture mitigates the threats foreseen by opting a comprehensive security mechanisms amenable to both the operators and the subscribers, while satisfying the acceptable level of security required. Copyright © 2009 John Wiley & Sons, Ltd.

[1]  C. Galindo,et al.  Combination of UWB and GPS for indoor-outdoor vehicle localization , 2007, 2007 IEEE International Symposium on Intelligent Signal Processing.

[2]  Jeffrey G. Andrews,et al.  Femtocell networks: a survey , 2008, IEEE Communications Magazine.

[3]  A. Nelson,et al.  Suppressing flavor anarchy , 2000, hep-ph/0006251.

[4]  Deborah Estrin,et al.  GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..

[5]  Georgios Kambourakis,et al.  Performance Evaluation of Public Key-Based Authentication in Future Mobile Communication Systems , 2004, EURASIP J. Wirel. Commun. Netw..

[6]  Pasi Eronen,et al.  Multiple Authentication Exchanges in the Internet Key Exchange (IKEv2) Protocol , 2006, RFC.

[7]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[8]  Johann Großschädl,et al.  Reassessing the TCG specifications for trusted computing in mobile and embedded systems , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[9]  Charlie Kaufman,et al.  Internet Key Exchange (IKEv2) Protocol , 2005, RFC.