Enhanced Security Algorithm with Key Exchange Protocol in Wireless Network

被引:0
|
作者
Princy, Infanta S. [1 ]
Revathi, G. [1 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, BIT Campus, Tiruchirappalli, Tamil Nadu, India
关键词
Long-Term Evolution (LTE); Multihop; Worldwide Interoperable For Microwave Access (WiMAX) and Elliptic Curve Diffie Hellman (ECDH);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the proposed attack detection scheme in QOS security architecture with elliptic curve Diffie-Hellman (ECDH) protocol to overcome the attacks IMS (IP Multimedia Subsystem) and Femto cell access points (H(e) NBs). Initially, it refers the current security threats and security standards in WiMAX and LTE networks. Both networks WiMAX and LTE are Fourth Generation (4G) wireless technology with well-defined Quality of Service (QOS) and security architecture. In LTE network, the present theoretical analysis of proposed scheme gives a good performance and experimental results in means of throughput, latency and frameless that are compared and analyzed with testbed implementation and simulation approaches of LTE.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Two-round contributory group key exchange protocol for wireless network environments
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    Yu, Ching-Wen
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [22] An Intrusion-tolerant Secure Routing Protocol with Key Exchange for Wireless Sensor Network
    Zhou, Jiliang
    Li, Caixia
    Cao, Qiying
    Shen, Yu
    [J]. 2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 1547 - 1552
  • [23] Two-round contributory group key exchange protocol for wireless network environments
    Tsu-Yang Wu
    Yuh-Min Tseng
    Ching-Wen Yu
    [J]. EURASIP Journal on Wireless Communications and Networking, 2011
  • [24] Enhanced Modelling of Authenticated Key Exchange Security
    Seye, Papa B.
    Sarr, Augustin P.
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2017), 2017, 10547 : 36 - 52
  • [25] Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure
    Prakasha, Krishna
    Muniyal, Balachandra
    Acharya, Vasundhara
    [J]. INFORMATION DISCOVERY AND DELIVERY, 2019, 48 (01) : 14 - 22
  • [26] An Security Algorithm for Wireless Sensor Network
    Jin Huting
    [J]. 2011 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE (ICMI 2011), PT 1, 2011, 3 : 96 - 101
  • [27] Key Technologies of Wireless Heterogeneous Network Security
    Wu Meng
    [J]. ZTE Communications, 2008, (03) : 34 - 39
  • [28] Universally composable security authenticated key exchange protocol
    [J]. Zhang, Zinan, 1600, Science Press (41):
  • [29] Security analysis of a password authenticated key exchange protocol
    Bao, F
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 208 - 217
  • [30] A Certificateless Noninteractive Key Exchange Protocol with Provable Security
    Cao, Xuefei
    Dang, Lanjun
    Luan, Yingzi
    You, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020