Font Size: a A A

The Research Of End-to-End Security In LTE Network

Posted on:2015-06-28Degree:MasterType:Thesis
Country:ChinaCandidate:X H WangFull Text:PDF
GTID:2298330431463997Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development of the mobile network, more and more applications are implementedbased on it. As the security between a user and an application server receives more attention,many applications are required to assure the end-to-end security between the client and theapplication server. GAA (Generic Authentication Architecture) provides a general authenticationmechanism which defines how to use the security infrastructure of the cellular network toprovide the authentication service between the user and the application server. The ‘General’means we do not need to build individual authentication facility for each application. In addition,mutual authentication between different user and the application server is also achieved by thearchitecture. However, in some scenarios, such as application server with limited capacity orMachine Type Communication (MTC) environment, the GAA will show less efficiency andlong time-delay. Thus, under these circumstances, the GAA could not fulfill the Quality ofService (QoS) requirements of application services.Two end-to-end security schemes are proposed aiming to above mentioned scenariosrespectively. Based on Needham-Schroeder protocol, an improved authentication scheme isgiven for application server with limited capacity, to solving the problem of inefficientauthentication. For MTC communications, the method of batch verification is applied toauthentication protocol, which could alleviate signaling congestion problem caused byapplication layer authentication for MTC communication. The analysis of the two schemesshows that they are of good performance and satisfy the security requirements of end-to-endsecurity. The schemes not only make up for the shortcomings of the GAA, but also shorten thetime delay of the authentication and improve efficiency of the authentication.
Keywords/Search Tags:Security Protocol, Generic Authentication Architecture, Key Agreement, End-to-End Security, Machine Type Communication
PDF Full Text Request
Related items