DOI QR코드

DOI QR Code

A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management

  • Sun, Bangyi (College of Computer Science and Technology, Jilin University) ;
  • Chu, Jianfeng (College of Computer Science and Technology, Jilin University) ;
  • Hu, Liang (College of Computer Science and Technology, Jilin University) ;
  • Li, Hongtu (College of Computer Science and Technology, Jilin University) ;
  • Shi, Guangkun (College of Computer Science and Technology, Jilin University)
  • Received : 2016.11.02
  • Accepted : 2017.04.09
  • Published : 2017.09.30

Abstract

The commercialization of LTE/SAE technologies has begun a new era in which data can be transmitted at remarkably high rates. The security of the LTE/SAE network, however, remains problematic. The forward security in LTE/SAE X2 handover key management can be threatened by key compromise and de-synchronization attacks as base station in public spaces can be compromised. This study was conducted to address the lack of forward key security in X2 handover key management in scenarios in which an adversary controls a legal base station. We developed the proposed X2 handover key management by changing the parameter in the renewing step and adding a verification step. We compare the security and performance of our proposal with other similar schemes. Our enhancement scheme ensures forward separation security accompanied by favorable signal and computation load performance.

Keywords

References

  1. Liu Qi, Shi Yameng ,Li Fuchang and Fan Bin, "Research on Services Modeling in LTE Networks," China Communications, vol. 13, no. 2, pp. 109-120, February 2016. https://doi.org/10.1109/CC.2016.7833465
  2. Cao Jin, Ma Maode and Li Hui, "Unified handover authentication between heterogeneous access systems in LTE networks," in Proc. of the IEEE Global Communications Conference, pp.5308-5313, December 3-7, 2012.
  3. Yaseein Soubhi Hussein, Borhanuddin M Ali, Mohd Fadlee A. Rasid and Aduwati Sali, "Handover in LTE networks with proactive multiple preparation approach and adaptive parameters using fuzzy logic control," KSII transactions on internet and information systems, vol. 9, no. 7, pp. 2389-2413, July, 2015. https://doi.org/10.3837/tiis.2015.07.004
  4. Amitava Ghost, Rapeepat Ratasuk and Bishwarup Mondal, "MONDAL B, et al. LTE-advanced: Next-generation wireless broadband technology," IEEE wireless communications, vol. 17, no. 3, pp. 10-22, June 2010. https://doi.org/10.1109/MWC.2010.5490974
  5. Chan-kyu Han and Hyoung-Kee Choi, "Security analysis of handover key management in 4G LTE/SAE networks," IEEE Transactions on Mobile Computing, vol. 13, no. 2, pp. 457-468, February, 2014. https://doi.org/10.1109/TMC.2012.242
  6. Cao Jin, Ma Maode, Li Hui, Zhang Yueyu and Luo Zhengxing, "A survey on security aspects for LTE and LTE-A networks," IEEE communications surveys& tutorials, vol. 16, no. 1, pp. 283-302, First quarter, 2014. https://doi.org/10.1109/SURV.2013.041513.00174
  7. Cao Jin, Li Hui, Ma Maode, Zhang Yueyu and Lai Chengzhe, "A simple and robust handover authentication between HeNB and eNB in LTE networks," Computer Networks, vol. 56, no. 8, pp. 2119-2131, May, 2012. https://doi.org/10.1016/j.comnet.2012.02.012
  8. Li Taicheng, He Li and Wu Bin, "Key refresh during cell handover in LTE featuring one-Hop forward security," Computer Systems & Applications, vol. 20, no. 8, pp. 67-71, August, 2011.
  9. Xiao Qinshu, Zhou Wenan, Cui Baojiang and Li Lingrong, "An Enhancement for key management in LTE/SAE X2 handover based on ciphering key parameters," in Proc. of the 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp.256-261, November 8-10, 2014.
  10. Eman F. ElGaml, Hussein ElAttar and Hesham M. ElBadawy, "Evaluation of Intrusion Prevention Technique in LTE Based Network," International Journal of Scientific & Engineering Research, vol. 5, issue.12, pp.1395-1400, December 2014.
  11. Dan Forsberg, "LTE key management analysis with session keys context," Computer Communications, vol. 33, no. 16, pp. 1907-1915, July 2010. https://doi.org/10.1016/j.comcom.2010.07.002
  12. Naim Qachri, Olivier Markowitch and Jean-Michel Dricot, "A Formally Verified Protocol for Secure Vertical Handovers in 4G Heterogeneous Networks," International Journal of Security and Its Applications, vol.7, no.6, pp.309-326, July,2013. https://doi.org/10.14257/ijsia.2013.7.6.32
  13. 3GPP, Evolved universal terrestrial radio access network(EUTRAN), architecture description, 3GPP TS 36.401 v9.2.0, 2010.
  14. Chang Junren, Li Yajuan, Feng Shulan, Wang Haiguang, Sun Chengzhen and Zhang Philipp, "A fractional soft handover scheme for 3GPP LTE-Advanced System," in Proc. of the 2009 IEEE International Conference, pp.1-5, June 14-18, 2009.
  15. NIEMI V, NYBERG K. UMTS security. John Wiley & Sons ,UK,2003.
  16. 3GPP. Security objectives and principles. 3GPP TS33.120, 2001.
  17. 3G Security, Security Architecture (Release 11), 3GPP TS 33.102, Version 11.1.0, 2011.
  18. 3GPP System Architecture Evolution (SAE), Security Architecture(Release 11), 3GPP TS 33.401, v11.2.0, 2011.
  19. Hyun-Seo Park, Yong-Seouk Choi, Byung-Chul Kim, and Jae-Yong Lee, "LTE mobility enhancements for evolution into 5G," ETRI Journal, vol. 37, no. 6, pp. 1065-1076, December, 2015. https://doi.org/10.4218/etrij.15.0115.0529
  20. Chen Jengyueng, Yang Chunchuan and Mai Yiting, "A Novel Smart Forwarding Scheme in LTE-Advanced Networks," China Communications, vol. 12, no. 3, pp. 120-131, March 2015. https://doi.org/10.1109/CC.2015.7084370
  21. Mohmad Anas, Francesco D. Calabrese, Preben E.Mogensen, Claudio Rosa and Klaus I. Pedersen, "Performance evaluation of received signal strength based hard handover for UTRAN LTE," in Proc. of the IEEE 65th Vehicular Technology Conference, pp.1046-1050, April 22-25, 2007.
  22. Dan Forsberg, Huang Leping, Kashima Tsuyoshi and Seppo Alanara, "Enhancing security and privacy in 3GPP EUTRAN radio interface," in Proc. of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp.1-5, September 3-7, 2007.
  23. Danny Dolev and Andrew ChiChih Yao, "On the Security of Public Key Protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-208, October, 1983. https://doi.org/10.1109/TIT.1983.1056650
  24. Noomene Ben, Henda and Karl Norrman, "Formal Analysis of Security Procedures in LTE - A Feasibility Study," Lecture Notes in Computer Science Springer International Publishing, vol. 8688, pp. 341-361, 2014.