Providing security in 4G systems: unveiling the challenges

Aiash, Mahdi and Mapp, Glenford E. and Lasebae, Aboubaker and Phan, Raphael (2010) Providing security in 4G systems: unveiling the challenges. In: Telecommunications (AICT), 2010 Sixth Advanced International Conference on. Atmaca, Tulin and Palicot, Jacques and Amor, Nafkha and Tsiatsos, Thrasyvoulos and Marot, Michel and Dini, Oana, eds. IEEE, pp. 439-444.

[img]
Preview
PDF - Published Version
272kB

Official URL: http://www.computer.org/portal/web/csdl

Abstract

Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a clear identification of potential threats, this paper attempts to outline the security challenges in 4G networks. A good way to achieve this is by investigating the possibility of extending current security mechanisms to 4G networks. Therefore, this paper uses the X.805 standard to investigate the possibility of implementing the 3G’s Authentication and Key Agreement (AKA) protocol in a 4G communication framework such as YComm. The results show that due to the fact that 4G is an open, heterogeneous and IP-based environment, it will suffer from new security threats as well as inherent ones. In order to address these threats without affecting 4G dynamics, Y-Comm proposes an integrated security module to protect data and security models to target security on different entities and hence protecting not only the data but, also resources, servers and users.

Item Type:Book Section
Additional Information:

Sixth Advanced International Conference on Telecommunications, AICT 2010 held in Barcelona in May 2010.

Research Areas:Middlesex University Schools and Centres > School of Science and Technology > Computer and Communications Engineering
Middlesex University Schools and Centres > School of Science and Technology > Computer Science > SensoLab group
ID Code:6483
Useful Links:
Deposited On:16 Sep 2010 14:10
Last Modified:04 Nov 2014 14:39

Repository staff only: item control page

Full text downloads (NB count will be zero if no full text documents are attached to the record)

Downloads per month over the past year