Security protocol design against malicious attacks in 4G LTE wireless systems
A seamless and secure handover is always one important goal of cellular network design. The handover scheme of the current Long Term Evolution (LTE) mobile network is complex due to the presence of two different types of base stations. In LTE communication systems, a normal base station is referred...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/61164 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-61164 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-611642023-07-07T16:16:14Z Security protocol design against malicious attacks in 4G LTE wireless systems Wang, Xilei Ma Maode School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering A seamless and secure handover is always one important goal of cellular network design. The handover scheme of the current Long Term Evolution (LTE) mobile network is complex due to the presence of two different types of base stations. In LTE communication systems, a normal base station is referred to as an eNodeB (eNB). In addition to it, another kind of base station called Home eNodeB (HeNB) was also introduced. What increases the level of complexity of the system is the fact that HeNB cannot directly communicate with eNB. Therefore, in the network, different handover scenarios involving a HeNB have to be considered carefully and treated separately, which results in a handover scheme with many different scenarios. Besides, since key chain is used in the handover system, the LTE handover scheme is found to be lack of backward security. Considering above mentioned facts, a proxy signature-based handover scheme is proposed in this project to achieve a both secure and simple handover system. The proposed scheme is based on the Elliptic Curve Cryptography (ECC) algorithm, which makes the computational cost of the scheme smaller compared to other handover schemes with similar levels of security and complexity. Bachelor of Engineering 2014-06-05T08:31:29Z 2014-06-05T08:31:29Z 2014 2014 Final Year Project (FYP) http://hdl.handle.net/10356/61164 en Nanyang Technological University 76 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering Wang, Xilei Security protocol design against malicious attacks in 4G LTE wireless systems |
description |
A seamless and secure handover is always one important goal of cellular network design. The handover scheme of the current Long Term Evolution (LTE) mobile network is complex due to the presence of two different types of base stations. In LTE communication systems, a normal base station is referred to as an eNodeB (eNB). In addition to it, another kind of base station called Home eNodeB (HeNB) was also introduced. What increases the level of complexity of the system is the fact that HeNB cannot directly communicate with eNB. Therefore, in the network, different handover scenarios involving a HeNB have to be considered carefully and treated separately, which results in a handover scheme with many different scenarios. Besides, since key chain is used in the handover system, the LTE handover scheme is found to be lack of backward security. Considering above mentioned facts, a proxy signature-based handover scheme is proposed in this project to achieve a both secure and simple handover system. The proposed scheme is based on the Elliptic Curve Cryptography (ECC) algorithm, which makes the computational cost of the scheme smaller compared to other handover schemes with similar levels of security and complexity. |
author2 |
Ma Maode |
author_facet |
Ma Maode Wang, Xilei |
format |
Final Year Project |
author |
Wang, Xilei |
author_sort |
Wang, Xilei |
title |
Security protocol design against malicious attacks in 4G LTE wireless systems |
title_short |
Security protocol design against malicious attacks in 4G LTE wireless systems |
title_full |
Security protocol design against malicious attacks in 4G LTE wireless systems |
title_fullStr |
Security protocol design against malicious attacks in 4G LTE wireless systems |
title_full_unstemmed |
Security protocol design against malicious attacks in 4G LTE wireless systems |
title_sort |
security protocol design against malicious attacks in 4g lte wireless systems |
publishDate |
2014 |
url |
http://hdl.handle.net/10356/61164 |
_version_ |
1772827663977676800 |