A Console GRID LA Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE

by   Rajakumar Arul, et al.

The growing popularity of multimedia applications, pervasive connectivity, higher bandwidth, and euphoric technology penetration among the bulk of the human race that happens to be cellular technology users, has fueled the adaptation to Long Term Evolution (LTE)/ System Architecture Evolution (SAE). The LTE fulfills the resource demands of the next generation applications for now. We identify security issues in the authentication mechanism used in LTE that without countermeasures might give superuser rights to unauthorized users. The LTE uses static LTE Key (LTE-K) to derive the entire key hierarchy such as LTE follows Evolved Packet System-Authentication and Key Agreement (EPS-AKA) based authentication which discloses user identity, location, and other Personally Identifiable Information (PII). To counter this, we propose a public key cryptosystem named International mobile subscriber identity Protected Console Grid-based Authentication and Key Agreement (IPG-AKA) protocol to address the vulnerabilities related to weak key management. From the data obtained from threat modeling and simulation results, we claim that the IPG-AKA scheme not only improves the security of authentication procedures, it also shows improvements in authentication loads and reduction in key generation time. The empirical results and qualitative analysis presented in this paper proves that IPG-AKA improves security in authentication procedure and performance in the LTE.


page 10

page 12


A Quantum Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario

Millions of devices are going to participate in 5G producing a huge spac...

Attacks Against Security Context in 5G Network

The security context used in 5G authentication is generated during the A...

Image Based Password Authentication System

Preservation of information and computer security is broadly dependent o...

Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

The new generation of security threats has been promoted by digital curr...

SCC5G: A PQC-based Architecture for Highly Secure Critical Communication over Cellular Network in Zero-Trust Environment

5G made a significant jump in cellular network security by offering enha...

Security management for backhaul-aware 5G-V2X

Security is a primary concern for the networks aiming at the utilization...

Please sign up or login with your details

Forgot password? Click here to reset