Security protocol design against malicious attacks in 4G LTE wireless systems

A seamless and secure handover is always one important goal of cellular network design. The handover scheme of the current Long Term Evolution (LTE) mobile network is complex due to the presence of two different types of base stations. In LTE communication systems, a normal base station is referred...

Full description

Saved in:
Bibliographic Details
Main Author: Wang, Xilei
Other Authors: Ma Maode
Format: Final Year Project
Language:English
Published: 2014
Subjects:
Online Access:http://hdl.handle.net/10356/61164
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-61164
record_format dspace
spelling sg-ntu-dr.10356-611642023-07-07T16:16:14Z Security protocol design against malicious attacks in 4G LTE wireless systems Wang, Xilei Ma Maode School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering A seamless and secure handover is always one important goal of cellular network design. The handover scheme of the current Long Term Evolution (LTE) mobile network is complex due to the presence of two different types of base stations. In LTE communication systems, a normal base station is referred to as an eNodeB (eNB). In addition to it, another kind of base station called Home eNodeB (HeNB) was also introduced. What increases the level of complexity of the system is the fact that HeNB cannot directly communicate with eNB. Therefore, in the network, different handover scenarios involving a HeNB have to be considered carefully and treated separately, which results in a handover scheme with many different scenarios. Besides, since key chain is used in the handover system, the LTE handover scheme is found to be lack of backward security. Considering above mentioned facts, a proxy signature-based handover scheme is proposed in this project to achieve a both secure and simple handover system. The proposed scheme is based on the Elliptic Curve Cryptography (ECC) algorithm, which makes the computational cost of the scheme smaller compared to other handover schemes with similar levels of security and complexity. Bachelor of Engineering 2014-06-05T08:31:29Z 2014-06-05T08:31:29Z 2014 2014 Final Year Project (FYP) http://hdl.handle.net/10356/61164 en Nanyang Technological University 76 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering
spellingShingle DRNTU::Engineering::Electrical and electronic engineering
Wang, Xilei
Security protocol design against malicious attacks in 4G LTE wireless systems
description A seamless and secure handover is always one important goal of cellular network design. The handover scheme of the current Long Term Evolution (LTE) mobile network is complex due to the presence of two different types of base stations. In LTE communication systems, a normal base station is referred to as an eNodeB (eNB). In addition to it, another kind of base station called Home eNodeB (HeNB) was also introduced. What increases the level of complexity of the system is the fact that HeNB cannot directly communicate with eNB. Therefore, in the network, different handover scenarios involving a HeNB have to be considered carefully and treated separately, which results in a handover scheme with many different scenarios. Besides, since key chain is used in the handover system, the LTE handover scheme is found to be lack of backward security. Considering above mentioned facts, a proxy signature-based handover scheme is proposed in this project to achieve a both secure and simple handover system. The proposed scheme is based on the Elliptic Curve Cryptography (ECC) algorithm, which makes the computational cost of the scheme smaller compared to other handover schemes with similar levels of security and complexity.
author2 Ma Maode
author_facet Ma Maode
Wang, Xilei
format Final Year Project
author Wang, Xilei
author_sort Wang, Xilei
title Security protocol design against malicious attacks in 4G LTE wireless systems
title_short Security protocol design against malicious attacks in 4G LTE wireless systems
title_full Security protocol design against malicious attacks in 4G LTE wireless systems
title_fullStr Security protocol design against malicious attacks in 4G LTE wireless systems
title_full_unstemmed Security protocol design against malicious attacks in 4G LTE wireless systems
title_sort security protocol design against malicious attacks in 4g lte wireless systems
publishDate 2014
url http://hdl.handle.net/10356/61164
_version_ 1772827663977676800