Efficient DDoS attack immune authentication and key agreement protocol for LTE

The 3GPP Long Term Evolution (LTE) technology is the latest technological step to support mobile communication. LTE has successfully achieved fast downlink and uplink transmission rate when compared with traditional 3G network technology. With the advanced capacity, LTE has been widely accepted and...

Full description

Saved in:
Bibliographic Details
Main Author: Li, Luying
Other Authors: Ma Maode
Format: Final Year Project
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/53117
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:The 3GPP Long Term Evolution (LTE) technology is the latest technological step to support mobile communication. LTE has successfully achieved fast downlink and uplink transmission rate when compared with traditional 3G network technology. With the advanced capacity, LTE has been widely accepted and marked by most mobile operators around the world. Several researches have already emphasized the high power consumption problems and the confidentiality protection insufficient of LTE. However, as increasingly mobile users are subscribed to LTE technology, the attackers may take advantage of security vulnerability to conduct malicious attack towards the legitimate end users. It is observed that among all the malicious attacks, Distributed Denial of Service (DDoS) has the widest negative impact and moreover, this kind of attack is very difficult to prevent. This paper proposed an EDI-AKA protocol as an effective authentication and key agreement protocol for LTE to detect DDoS attack and protect the wireless communication environment. The EDI-AKA protocol is verified by simulation using color petri net software. The differences between the standard authentication protocol and the EDI-AKA protocol are analyzed with the help of color petri net tool.