A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core

In this paper, we propose a secure authentication scheme, called the Security system with Pseudo random number generator, Diffie-Hellman algorithms and Data Connection Core (SPDiD for short) for a wireless environment. The SPDiD employs a data connection core (DCC for short), as its pre-connected logic link before communication starts, to exchange the keys and messages for a connection authentication, not only reducing the number of steps for the process of authenticating a network entity when comparing it with LTE-A or WiMAX authentication processes, but also generating more symmetry keys by using pseudo random number sequences (PRNSs for short) for key and message encryption without lowering the security level of a wireless session. Moreover, the SPDiD protects the first authentication message delivered between the two network entities at the two ends of a connection by using the DCC of the user, which is only known to the user and authenticator. The purpose is to securely accomplish the mutual authentication between the two network entities, and prevent hackers from capturing the input parameters (i.e., the seeds) of a Pseudo random number generator (PRNG for short). Furthermore, we compare the SPDiD with popular wireless communication schemes, like the LTE-A and WiMAX. The results indicate that the SPDiD has better performance and higher security than the compared systems have.

[1]  Biswajit Nandy,et al.  Security advances and challenges in 4G wireless networks , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[2]  Muhammad Younus,et al.  Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.

[3]  Fang-Yie Leu,et al.  A Secure Communication over Wireless Environments by Using a Data Connection Core , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[4]  Ning Zhang,et al.  Analysis of mobile WiMAX security: Vulnerabilities and solutions , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[5]  Dan Forsberg,et al.  LTE Security , 2010 .

[6]  Sedat Akleylek,et al.  Security requirements for cryptographic modules , 2013 .

[7]  Y.-F.a Huang,et al.  A pseudorandom number generator based on grey system theory , 2009 .

[8]  George Georgiou,et al.  WiFi and WiMAX Secure Deployments , 2010, J. Comput. Networks Commun..

[9]  Long Term Evolution ( LTE ) : A Technical Overview , 2022 .

[10]  William M. Daley,et al.  Security Requirements for Cryptographic Modules , 1999 .

[11]  Satoshi Konishi,et al.  Introduction of LTE , 2010 .