The motivation to reach fourth generation with high data rate throughout subscriber movement is the main goal of 3GPP Long Term Evolution/ System Architecture Evolution (LTE/SAE). The design of 3GPP LTE/SAE is to have purely IP-based architecture that creates a number of new challenges in designing the security mechanism against the risks, One of these challenges is to protect the subscriber authentication and communication from intruders when first attach to the LTE network and every time handover process occurs. However, because of the difficulty of warding off the IP-specific attacks and the complexity of cryptographic calculations we propose a mechanism oriented toward key revocation instead of reliance on a cryptographic function only. Handover key management in the 3GPP LTE/SAE has been designed to overcome the lack of privacy and insecure automatic key updates while minimizing signaling overhead on the network and computation delay by controlling the revocation process and determining the appropriate interval for operators to refresh the keys. Our main contribution, however, is to determine analytically the best description of the volume of exposed packets during the vulnerable period to help operators enhancing the prevention techniques on LTE networks without signaling overheads throughout different mobility schemes.
[1]
Hyoung-Kee Choi,et al.
Security Analysis of Handover Key Management in 4G LTE/SAE Networks
,
2014,
IEEE Transactions on Mobile Computing.
[2]
Dan Forsberg,et al.
Enhancing Security and Privacy in 3GPP E-UTRAN Radio Interface
,
2007,
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[3]
Dan Forsberg,et al.
LTE Security
,
2010
.
[4]
Debasis Kundu,et al.
Discriminating Between The Log-normal and Gamma Distributions
,
2022
.
[5]
Long Term Evolution ( LTE ) : A Technical Overview
,
2022
.
[6]
Hyoung-Kee Choi,et al.
Evaluation of authentication signaling loads in 3GPP LTE/SAE networks
,
2009,
2009 IEEE 34th Conference on Local Computer Networks.
[7]
Dan Forsberg,et al.
LTE key management analysis with session keys context
,
2010,
Comput. Commun..
[8]
Anand R. Prasad,et al.
Overview of SAE/LTE security
,
2013
.