Efficient DDoS attack immune authentication and key agreement protocol for LTE

The 3GPP Long Term Evolution (LTE) technology is the latest technological step to support mobile communication. LTE has successfully achieved fast downlink and uplink transmission rate when compared with traditional 3G network technology. With the advanced capacity, LTE has been widely accepted and...

Full description

Saved in:
Bibliographic Details
Main Author: Li, Luying
Other Authors: Ma Maode
Format: Final Year Project
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/53117
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-53117
record_format dspace
spelling sg-ntu-dr.10356-531172023-07-07T16:46:55Z Efficient DDoS attack immune authentication and key agreement protocol for LTE Li, Luying Ma Maode School of Electrical and Electronic Engineering DRNTU::Engineering The 3GPP Long Term Evolution (LTE) technology is the latest technological step to support mobile communication. LTE has successfully achieved fast downlink and uplink transmission rate when compared with traditional 3G network technology. With the advanced capacity, LTE has been widely accepted and marked by most mobile operators around the world. Several researches have already emphasized the high power consumption problems and the confidentiality protection insufficient of LTE. However, as increasingly mobile users are subscribed to LTE technology, the attackers may take advantage of security vulnerability to conduct malicious attack towards the legitimate end users. It is observed that among all the malicious attacks, Distributed Denial of Service (DDoS) has the widest negative impact and moreover, this kind of attack is very difficult to prevent. This paper proposed an EDI-AKA protocol as an effective authentication and key agreement protocol for LTE to detect DDoS attack and protect the wireless communication environment. The EDI-AKA protocol is verified by simulation using color petri net software. The differences between the standard authentication protocol and the EDI-AKA protocol are analyzed with the help of color petri net tool. Bachelor of Engineering 2013-05-30T03:03:57Z 2013-05-30T03:03:57Z 2013 2013 Final Year Project (FYP) http://hdl.handle.net/10356/53117 en Nanyang Technological University 48 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering
spellingShingle DRNTU::Engineering
Li, Luying
Efficient DDoS attack immune authentication and key agreement protocol for LTE
description The 3GPP Long Term Evolution (LTE) technology is the latest technological step to support mobile communication. LTE has successfully achieved fast downlink and uplink transmission rate when compared with traditional 3G network technology. With the advanced capacity, LTE has been widely accepted and marked by most mobile operators around the world. Several researches have already emphasized the high power consumption problems and the confidentiality protection insufficient of LTE. However, as increasingly mobile users are subscribed to LTE technology, the attackers may take advantage of security vulnerability to conduct malicious attack towards the legitimate end users. It is observed that among all the malicious attacks, Distributed Denial of Service (DDoS) has the widest negative impact and moreover, this kind of attack is very difficult to prevent. This paper proposed an EDI-AKA protocol as an effective authentication and key agreement protocol for LTE to detect DDoS attack and protect the wireless communication environment. The EDI-AKA protocol is verified by simulation using color petri net software. The differences between the standard authentication protocol and the EDI-AKA protocol are analyzed with the help of color petri net tool.
author2 Ma Maode
author_facet Ma Maode
Li, Luying
format Final Year Project
author Li, Luying
author_sort Li, Luying
title Efficient DDoS attack immune authentication and key agreement protocol for LTE
title_short Efficient DDoS attack immune authentication and key agreement protocol for LTE
title_full Efficient DDoS attack immune authentication and key agreement protocol for LTE
title_fullStr Efficient DDoS attack immune authentication and key agreement protocol for LTE
title_full_unstemmed Efficient DDoS attack immune authentication and key agreement protocol for LTE
title_sort efficient ddos attack immune authentication and key agreement protocol for lte
publishDate 2013
url http://hdl.handle.net/10356/53117
_version_ 1772825578947215360