Next Article in Journal
Benjamin–Bona–Mahony Equation with Variable Coefficients: Conservation Laws
Next Article in Special Issue
A Study on Electronic-Money Technology Using Near Field Communication
Previous Article in Journal / Special Issue
MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats
Article Menu

Export Article

Open AccessArticle
Symmetry 2014, 6(4), 1011-1025; https://doi.org/10.3390/sym6041011

Privacy-Enhancing Security Protocol in LTE Initial Attack

1
Korea Copyright Commission, 619 Gaepo-Ro, Gangnam-Gu 135-240, Korea
2
Department of Computing, Soongsil University, 369 Sangdo-Ro, Dongjak-Gu, Seoul 156-743, Korea
*
Author to whom correspondence should be addressed.
Received: 14 August 2014 / Revised: 24 October 2014 / Accepted: 1 December 2014 / Published: 12 December 2014
Full-Text   |   PDF [1133 KB, uploaded 12 December 2014]

Abstract

Long-Term Evolution (LTE) is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI), Radio Network Temporary Identities (RNTI), etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process. View Full-Text
Keywords: future cyber world (FCW); initial attach; Long-Term Evolution (LTE); privacy enhancing; security protocol future cyber world (FCW); initial attach; Long-Term Evolution (LTE); privacy enhancing; security protocol
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Jang, U.; Lim, H.; Kim, H. Privacy-Enhancing Security Protocol in LTE Initial Attack. Symmetry 2014, 6, 1011-1025.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top