Providing Security in 4G Systems: Unveiling the Challenges

Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a clear identification of potential threats, this paper attempts to outline the security challenges in 4G networks. A good way to achieve this is by investigating the possibility of extending current security mechanisms to 4G networks. Therefore, this paper uses the X.805 standard to investigate the possibility of implementing the 3G’s Authentication and Key Agreement (AKA) protocol in a 4G communication framework such as YComm. The results show that due to the fact that 4G is an open, heterogeneous and IP-based environment, it will suffer from new security threats as well as inherent ones. In order to address these threats without affecting 4G dynamics, Y-Comm proposes an integrated security module to protect data and security models to target security on different entities and hence protecting not only the data but, also resources, servers and users.

[1]  KambourakisGeorgios,et al.  Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks , 2004 .

[2]  M. Gribaudo,et al.  2002 , 2001, Cell and Tissue Research.

[3]  Somayeh Salimi,et al.  An Extended Authentication and Key Agreement Protocol of UMTS , 2009, ISPEC.

[4]  Mahdi Aiash,et al.  Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks , 2009, 2009 International Conference on Network-Based Information Systems.

[5]  Praphul Chandra BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering) , 2005 .

[6]  Framework and overall objectives of the future development of IMT-2000 and systems beyond IMT , .

[7]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[8]  Joong Soo Ma,et al.  Mobile Communications , 2003, Lecture Notes in Computer Science.

[9]  Miguel A. Garcia-Martin Input 3rd-Generation Partnership Project (3GPP) Release 5 Requirements on the Session Initiation Protocol (SIP) , 2005, RFC.

[10]  Jon Crowcroft,et al.  Y-Comm: a global architecture for heterogeneous networking , 2007, WICON '07.

[11]  E. Scarrone,et al.  An all-IP solution for QoS mobility management and AAA in the 4G mobile networks , 2002, The 5th International Symposium on Wireless Personal Multimedia Communications.

[12]  Georgios Kambourakis,et al.  Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks , 2004, Wirel. Pers. Commun..

[13]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[14]  Chung-Ming Huang,et al.  Authentication and key agreement protocol for UMTS with low bandwidth consumption , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[15]  Taejoon Park,et al.  A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.