Efficient DDoS attack immune authentication and key agreement protocol for LTE
The 3GPP Long Term Evolution (LTE) technology is the latest technological step to support mobile communication. LTE has successfully achieved fast downlink and uplink transmission rate when compared with traditional 3G network technology. With the advanced capacity, LTE has been widely accepted and...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/53117 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | The 3GPP Long Term Evolution (LTE) technology is the latest technological step to support mobile communication. LTE has successfully achieved fast downlink and uplink transmission rate when compared with traditional 3G network technology. With the advanced capacity, LTE has been widely accepted and marked by most mobile operators around the world. Several researches have already emphasized the high power consumption problems and the confidentiality protection insufficient of LTE. However, as increasingly mobile users are subscribed to LTE technology, the attackers may take advantage of security vulnerability to conduct malicious attack towards the legitimate end users. It is observed that among all the malicious attacks, Distributed Denial of Service (DDoS) has the widest negative impact and moreover, this kind of attack is very difficult to prevent. This paper proposed an EDI-AKA protocol as an effective authentication and key agreement protocol for LTE to detect DDoS attack and protect the wireless communication environment. The EDI-AKA protocol is verified by simulation using color petri net software. The differences between the standard authentication protocol and the EDI-AKA protocol are analyzed with the help of color petri net tool. |
---|