Efficient DDoS attack immune authentication and key agreement protocol for LTE
The 3GPP Long Term Evolution (LTE) technology is the latest technological step to support mobile communication. LTE has successfully achieved fast downlink and uplink transmission rate when compared with traditional 3G network technology. With the advanced capacity, LTE has been widely accepted and...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/53117 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-53117 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-531172023-07-07T16:46:55Z Efficient DDoS attack immune authentication and key agreement protocol for LTE Li, Luying Ma Maode School of Electrical and Electronic Engineering DRNTU::Engineering The 3GPP Long Term Evolution (LTE) technology is the latest technological step to support mobile communication. LTE has successfully achieved fast downlink and uplink transmission rate when compared with traditional 3G network technology. With the advanced capacity, LTE has been widely accepted and marked by most mobile operators around the world. Several researches have already emphasized the high power consumption problems and the confidentiality protection insufficient of LTE. However, as increasingly mobile users are subscribed to LTE technology, the attackers may take advantage of security vulnerability to conduct malicious attack towards the legitimate end users. It is observed that among all the malicious attacks, Distributed Denial of Service (DDoS) has the widest negative impact and moreover, this kind of attack is very difficult to prevent. This paper proposed an EDI-AKA protocol as an effective authentication and key agreement protocol for LTE to detect DDoS attack and protect the wireless communication environment. The EDI-AKA protocol is verified by simulation using color petri net software. The differences between the standard authentication protocol and the EDI-AKA protocol are analyzed with the help of color petri net tool. Bachelor of Engineering 2013-05-30T03:03:57Z 2013-05-30T03:03:57Z 2013 2013 Final Year Project (FYP) http://hdl.handle.net/10356/53117 en Nanyang Technological University 48 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering |
spellingShingle |
DRNTU::Engineering Li, Luying Efficient DDoS attack immune authentication and key agreement protocol for LTE |
description |
The 3GPP Long Term Evolution (LTE) technology is the latest technological step to support mobile communication. LTE has successfully achieved fast downlink and uplink transmission rate when compared with traditional 3G network technology. With the advanced capacity, LTE has been widely accepted and marked by most mobile operators around the world. Several researches have already emphasized the high power consumption problems and the confidentiality protection insufficient of LTE. However, as increasingly mobile users are subscribed to LTE technology, the attackers may take advantage of security vulnerability to conduct malicious attack towards the legitimate end users. It is observed that among all the malicious attacks, Distributed Denial of Service (DDoS) has the widest negative impact and moreover, this kind of attack is very difficult to prevent. This paper proposed an EDI-AKA protocol as an effective authentication and key agreement protocol for LTE to detect DDoS attack and protect the wireless communication environment. The EDI-AKA protocol is verified by simulation using color petri net software. The differences between the standard authentication protocol and the EDI-AKA protocol are analyzed with the help of color petri net tool. |
author2 |
Ma Maode |
author_facet |
Ma Maode Li, Luying |
format |
Final Year Project |
author |
Li, Luying |
author_sort |
Li, Luying |
title |
Efficient DDoS attack immune authentication and key agreement protocol for LTE |
title_short |
Efficient DDoS attack immune authentication and key agreement protocol for LTE |
title_full |
Efficient DDoS attack immune authentication and key agreement protocol for LTE |
title_fullStr |
Efficient DDoS attack immune authentication and key agreement protocol for LTE |
title_full_unstemmed |
Efficient DDoS attack immune authentication and key agreement protocol for LTE |
title_sort |
efficient ddos attack immune authentication and key agreement protocol for lte |
publishDate |
2013 |
url |
http://hdl.handle.net/10356/53117 |
_version_ |
1772825578947215360 |