Improved Security and Handover Technique in (4G) LTE

Alhakam Ayad Salih
International Journal of Computational and Electronic Aspects in Engineering
Volume 3: Issue 4, December 2022, pp 76-83


Author's Information
Alhakam Ayad Salih1 
Corresponding Author
1College of Art, Tikrit University, Iraq
alhakam.a.allawie@tu.edu.iq

Article -- Peer Reviewed
First online on – 22 December 2022

Open Access article under Creative Commons License

Cite this article –Alhakam Ayad Salih, “Improved Security and Handover Technique in (4G) LTE”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 3, Issue 4, pp. 76-83, 2022.
https://doi.org/10.26706/ijceae.3.4.2211616


Abstract:-
Mobile communications play a significant role in our daily lives and are receiving greater attention from researchers as a result of the information and network technologies' quick growth. To meet the public's need for high speed, the 3GPP organization suggested the LTE mobile system. The LTE employs a hierarchical key management to enhance secure data transmission. However, the existing system lacks backward security and is susceptible to attack during the X2 handover procedure. We suggest an improved security feature by group key to address the mentioned problems and guard against malicious base stations and malicious attacks during the LTE x2 handover operation.
Index Terms:-
eNB, X2 Handover, Security, LTE
REFERENCES
  1. S. Oh, B. Ryu, and Y. Shin, “Epc signaling load impact over s1 and x2 handover on lte-advanced system,” in 2013 Third World Congress on Information and Communication Technologies (WICT), Dec 2013, pp. 183–188.

  2. J. Cao, H. Li, M. Ma, Y. Zhang, and C. Lai, ”A Simple and Robust Handover Authentication between HeNB and eNB in LTE Networks,”Computer Networks, Vol. 56, No. 8, May 2012, pp. 2119-2131.

  3. D. Forsberg, LTE key management analysis with session keys context, Computer Communications 33 (16) (2010) 907–1915.

  4. Q. Xiao, W. Zhou, B. Cui, and L. Li, “An enhancement for key management in LTE/SAE X2 handover based on ciphering key parameters,” Proc. - 2014 9th Int. Conf. P2P, Parallel, Grid, Cloud Internet Comput. 3PGCIC 2014, pp. 256–261, 2014.
    Crossref

  5. M. A. MOHAMED, “Handover Management Optimization over LTE A Network using S1 and X2 handover,” no. August, pp. 58–64, 2018.
    Crossref

  6. S. Oh, B. Ryu, and Y. Shin, “EPC signaling load impact over S1 and X2 handover on LTE-Advanced system,” 2013 3rd World Congr. Inf. Commun. Technol. WICT 2013, pp. 183–188, 2014.
    Crossref

  7. M. Assyadzily, A. Suhartomo, and A. Silitonga, “Evaluation of x2-handover performance based on rsrp measurement with friis path loss using network simulator version 3 (ns-3),” in Information and Commu- nication Technology (ICoICT), 2014 2nd International Conference on, May 2014, pp. 436–441.

  8. I. D. Moscholios, “Evaluation of Multirate Loss Models for the X2 Link of LTE Networks,” no. July, 2020.

  9. 3rd Generation Partnership Project; Technical Specification Group Radio Acess Network; Medium Acess Control (MAC); Protocol specification (Release 10); Technical Specification TS 36.321 v10.6.0.
    Online

  10. S. Sesia, I. Toufik, and M. Baker, LTE, The UMTS Long Term Evolution: From Theory to Practice. Wiley Publishing, 2009.

  11. 3GPP. 3rd Generation Partnership Project; Technical Specification Group Radio Acess Network; Radio Resource Control (RRC); Protocol specification (Release 10); Technical Specification TS 36.331 v10.6.0.

  12. Online

  13. 3GPP TR 25.912, “Feasibility Study for Evolved Universal Terrestrial Radio Access (UTRA) and Universal Terrestrial Radio Access Network(UTRAN), Version 12.0.0,” Tech. Rep., 2014.

  14. A. Bohk, L. Buttyn, L. Dra, An Authentication Scheme for Fast Handover between WiFi Access Points, in: Proceeding of ACM Wireless Internet Conference (WICON 2007),October 2007, pp.22–24.

  15. D. Forsberg, LTE key management analysis with session keys context, Computer Communications 33 (16) (2010)907–1915.

  16. Y. Lin and C. Yang, “Enhanced 4g Lte Authentication And Handover,” no. 9, pp. 45–47, 2015.

  17. C.Han and H.Choi, Security Analysis of Handover Key Management in 4G LTE/SAE Networks, IEEE Transactions On Mobile Computing, Vol. 13, No. 2, February 2014.

  18. K. Alexandris, N. Nikaein, R. Knopp, C. Bonnet, and A. X. A. Protocol, “Analyzing X2 Handover in LTE / LTE-A,” 2016.

  19. To view full paper, Download here


Publishing with