Enhanced Security Algorithm with Key Exchange Protocol in Wireless Network

被引:0
|
作者
Princy, Infanta S. [1 ]
Revathi, G. [1 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, BIT Campus, Tiruchirappalli, Tamil Nadu, India
关键词
Long-Term Evolution (LTE); Multihop; Worldwide Interoperable For Microwave Access (WiMAX) and Elliptic Curve Diffie Hellman (ECDH);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the proposed attack detection scheme in QOS security architecture with elliptic curve Diffie-Hellman (ECDH) protocol to overcome the attacks IMS (IP Multimedia Subsystem) and Femto cell access points (H(e) NBs). Initially, it refers the current security threats and security standards in WiMAX and LTE networks. Both networks WiMAX and LTE are Fourth Generation (4G) wireless technology with well-defined Quality of Service (QOS) and security architecture. In LTE network, the present theoretical analysis of proposed scheme gives a good performance and experimental results in means of throughput, latency and frameless that are compared and analyzed with testbed implementation and simulation approaches of LTE.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] On the security of an enhanced authentication key exchange protocol
    Hwang, MS
    Chang, TY
    Lin, SC
    Tsai, CS
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 160 - 163
  • [2] A Security Enhanced Authentication and Key Distribution Protocol for Wireless Networks
    Lv, Chao
    Ma, Maode
    Li, Hui
    Ma, Jianfeng
    [J]. 2010 IEEE GLOBECOM WORKSHOPS, 2010, : 1571 - 1575
  • [3] A security enhanced authentication and key distribution protocol for wireless networks
    Lv, Chao
    Ma, Maode
    Li, Hui
    Ma, Jianfeng
    Niu, Ben
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (04) : 343 - 352
  • [4] Enhanced mutual authentication and key exchange protocol for wireless communications
    He, Yi-Jun
    Lee, Moon-Chuen
    Li, Jie
    [J]. PROGRESS IN WWW RESEARCH AND DEVELOPMENT, PROCEEDINGS, 2008, 4976 : 348 - +
  • [5] Internet Key Exchange Protocol Simulation of HAIPE in Security Network
    Zhang Chuan-fu
    Yu Jiang
    SunWan-zhong
    Su Jin-hai
    [J]. 2010 14TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2010), 2010, : 250 - 253
  • [6] Modified temporal key integrity protocol for efficient wireless network security
    Doomun, M. Razvi
    Soyjaudah, K. M. Sunjiv
    [J]. SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 151 - 156
  • [7] Network based Security model using Symmetric Key Cryptography (AES 256-Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)
    Jharbade, Nitin K.
    Shrivastava, Rajesh
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (08): : 69 - 73
  • [8] An Efficient Authenticated Key Exchange Protocol for Wireless Body Area Network
    Yan, Rui
    Liu, Jingwei
    Sun, Rong
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2015, 322 : 51 - 58
  • [9] Authenticated key exchange for wireless security
    Imai, H
    Shin, S
    Kobara, K
    [J]. 2005 IEEE Wireless Communications and Networking Conference, Vols 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1180 - 1186
  • [10] Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network
    Li Xiehua
    Wang Yongjun
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,