Next Article in Journal / Special Issue
Scenario-Based Digital Forensics Challenges in Cloud Computing
Previous Article in Journal
Testing Lorentz and CPT Invariance with Neutrinos
Previous Article in Special Issue
Smartphone User Identity Verification Using Gait Characteristics
Article Menu

Export Article

Open AccessArticle
Symmetry 2016, 8(10), 106;

Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World

Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), 232 Gongneung-ro, Nowon-gu, Seoul 01811, Korea
Convergence Laboratory, KT Research and Development Center, 151 Taebong-ro, Seocho-gu, Seoul 06763, Korea
Department of Computer Science and Engineering, Soongsil University, 369 Sangdo-Ro, Dongjak-gu, Seoul 06978, Korea
Author to whom correspondence should be addressed.
Academic Editor: Young-Sik Jeong
Received: 6 September 2016 / Revised: 21 September 2016 / Accepted: 2 October 2016 / Published: 17 October 2016
(This article belongs to the Special Issue Symmetry in Secure Cyber World)
Full-Text   |   PDF [1475 KB, uploaded 17 October 2016]   |  


Long Term Evolution (LTE) and Long Term Evolution-Advanced (LTE-A) support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE) is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI) and Radio Network Temporary Identities (RNTI) are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME). The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB) and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards. View Full-Text
Keywords: initial attach; mutual authentication; LTE; hiding technic; session management initial attach; mutual authentication; LTE; hiding technic; session management

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Park, J.H.; Kim, H.; Kang, J. Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World. Symmetry 2016, 8, 106.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top