SECURITY V /S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL

Protocol and technology convergence, the core of near future communication, will soon be forming the interoperating heterogeneous networks. Attaining a strict secure authentication without risking the QoS performance and call success rates is a major concern when it comes to wireless heterogeneous networks. In order to achieve this, a generic, fast and secure, Authentication and Key Agreement protocol is to be used; a version of which is to be implemented between each two technologies. In this research, different existing EPS-EPS AKA protocols will be compared with our proposed protocol EC-AKA (Ensure Confidentiality Authentication and Key Agreement) based on security, cost effectiveness, signaling overhead, delay and performance. It is proven that EC-AKA is the exclusive protocol satisfying the New Generation Network’s KPIs and it will be promoted as the target generic AKA protocol in heterogeneous networks.

[1]  Dan Forsberg,et al.  LTE Security , 2010 .

[2]  Hugo Krawczyk,et al.  On Travelling Incognito , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.

[3]  Jacques Bou Abdo,et al.  Ensured confidentiality authentication and key agreement protocol for EPS , 2012, 2012 Symposium on Broadband Networks and Fast Internet (RELABIRA).

[4]  Hakima Chaouchi,et al.  On the Integration of LTE and Mobile WiMAX Networks , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.

[5]  G. Pujolle,et al.  A Trusted Handoff Decision Scheme for the Next Generation Wireless Networks , 2008 .

[6]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[7]  Weichao Wang,et al.  Homogeneous Security in Heterogeneous Networks: Towards a Generic Security Management Protocol , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[8]  G. Pujolle,et al.  A distributed trust and reputation model for capacity enhancement in wireless networks , 2008, 2008 1st IFIP Wireless Days.

[9]  Ali Al Shidhani Authentication and key management in heterogeneous wireless networks , 2010 .

[10]  Dake He,et al.  User authentication scheme based on self-certified public-key for next generation wireless network , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[11]  Aboubaker Lasebae,et al.  A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks , 2012, ArXiv.

[12]  Yongjun Wang,et al.  Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[13]  Jian-Hua Li,et al.  Security Protocol Analysis with Improved Authentication Tests , 2006, ISPEC.

[14]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[15]  Hugo Krawczyk,et al.  On travelling incognito [mobile computing] , 1994, Workshop on Mobile Computing Systems and Applications.