Abstract
The 3GPP long term Evolution or System Architecture Evolution (LTE/SAE) was designed for the dispositioning of the mobile networks towards 4G. The significant hurdle of 4G is about cementing the privacy and security gap. Due to the disclosures in the connectivity of public networks, a single malicious device could jeopardize the operation of a whole network of devices. The key deliverance handling within the 3GPP LTE/SAE is developed to unauthorize the keys that are being attacked and, in result, to alienate the miscreant keys off the chain of network. The proposed article recognizes the attacks that jeopardize the safe connectivity among the stops in the network chain and details the vulnerability of the key deliverance administration to desynchronization attacks. Even though the periodic upgrade of the root could prove to be a fundamental part of the system, the work proposed brings an emphasis on reducing the impact of desynchronization attacks which currently are unable to be prevented efficiently. The main focus of the design is to shed light on the ways the network operators work to confirm the optimal intervals for the periodic updates to reduce the signal weightage while providing secure user mobility. The analysis and model simulations intend to disclose the influence of the period of root key upgrade on integral operational levels such as constellation and user experience.
References
Ahmed, A. A., & Alzahrani, A. A. (2019). A comprehensive survey on handover management for vehicular ad hoc network based on 5G mobile networks technology. Transactions on Emerging Telecommunications Technologies, 30(3), e3546.
Gódor, G., Jakó, Z., Knapp, Á., & Imre, S. (2015). A survey of handover management in LTE-based multi-tier femtocell networks: Requirements, challenges and solutions. Computer Networks, 76, 17-41.
Haldorai, A., & Ramu, A. (2020). Security and channel noise management in cognitive radio networks. Computers & Electrical Engineering, 87, 106784.
Han, C. K., & Choi, H. K. (2012). Security analysis of handover key management in 4G LTE/SAE networks. IEEE Transactions on Mobile Computing, 13(2), 457-468.
Kalyani, G., & Chaudhari, S. (2020). An efficient approach for enhancing security in internet of things using the optimum authentication key. International Journal of Computers and Applications, 42(3), 306-314.
Kaur, R., & Mittal, S. (2020). SINR and Fuzzy Approach based Enhanced Handoff Decision Making Algorithm. Available at SSRN 3565899.
Kim, S., & Park, B. (2019). Multi-routing based Mobility Management with an Optimized Security Network. IEIE Transactions on Smart Processing & Computing, 8(4), 290-297.
Krishna Jyothi, K., & Chaudhari, S. (2019). A secure cluster-based authentication and key management protocol for machine-type communication in the LTE network. International Journal of Computers and Applications, 1-11.
Kumar, S., & Gaur, M. S. (2019, July). Handoff Prioritization to Manage Call Admission Control in Mobile Multimedia Networks for Healthcare. In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1-7). IEEE.
Liu, L., Chen, C., Pei, Q., Maharjan, S., & Zhang, Y. (2020). Vehicular edge computing and networking: A survey. Mobile Networks and Applications, 1-24.
Liyanage, M., Ahmed, I., Okwuibe, J., Ylianttila, M., Kabir, H., Santos, J. L., ... & De Oca, E. M. (2017). Enhancing security of software defined mobile networks. IEEE Access, 5, 9422-9438.
Manjula, T., & Anand, B. (2019). A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network. Journal of Ambient Intelligence and Humanized Computing, 1-11.
Qureshi, K. N., Din, S., Jeon, G., & Piccialli, F. (2020). Internet of Vehicles: Key Technologies, Network Model, Solutions and Challenges With Future Aspects. IEEE Transactions on Intelligent Transportation Systems.
Rani, S. S., Alzubi, J. A., Lakshmanaprabu, S. K., Gupta, D., & Manikandan, R. (2019). Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers. Multimedia Tools and Applications, 1-20.
Reddy, D. S. (2019). Probabilistic Model for Optimal Cell Selection for Seamless Handover in LTE/LTE-A Networks. Indian Journal of Public Health Research & Development, 10(5), 992-1000.
Robinson, Y. H., & Julie, E. G. (2019). MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks. Wireless Personal Communications, 109(2), 739-760.
Stamou, A., Dimitriou, N., Kontovasilis, K., & Papavassiliou, S. (2019). Autonomic handover management for heterogeneous networks in a future internet context: A survey. IEEE Communications Surveys & Tutorials, 21(4), 3274-3297.
Tang, J., Wen, H., Zeng, K., Liao, R. F., Pan, F., & Hu, L. (2019). Light-weight physical layer enhanced security schemes for 5G wireless networks. IEEE Network, 33(5), 126-133.
Tayyab, M., Gelabert, X., & Jäntti, R. (2019). A survey on handover management: From LTE to NR. IEEE Access, 7, 118907-118930.
Vien, Q. T., Le, T. A., Yang, X. S., & Duong, T. Q. (2019). Enhancing security of MME handover via fractional programming and Firefly algorithm. IEEE Transactions on Communications, 67(9), 6206-6220.
Wang, Y., Zhang, P., Zhou, Y., Yuan, J., Liu, F., & Li, G. (2010). Handover management in enhanced MIH framework for heterogeneous wireless networks environment. Wireless Personal Communications, 52(3), 615-636.
