scispace - formally typeset
Search or ask a question
Author

M. Prasad

Bio: M. Prasad is an academic researcher from Pondicherry Engineering College. The author has contributed to research in topics: Challenge–response authentication & Chip Authentication Program. The author has an hindex of 1, co-authored 1 publications receiving 2 citations.

Papers
More filters
Proceedings ArticleDOI
29 Apr 2013
TL;DR: This paper proposes an authentication key agreement algorithm which is secure and able to solve the vulnerabilities in the communication system and reduces the bandwidth utilization for authentication and number of transactions required for authentication is reduced.
Abstract: The authentication and key agreement (AKA) protocol for Long Term Evolution-Advanced (LTE-A) which is proposed to solve the vulnerabilities found in previous communication systems such as 2G and 3G systems. They still contain the vulnerabilities like redirection and man-in-the-middle attack. They gave way to the eavesdroppers to utilize and misuse the subscriber's resources and make the communication system to mischarge the customers. In this paper we propose an authentication key agreement algorithm which is secure and able to solve the vulnerabilities in the communication system. This reduces the bandwidth utilization for authentication and number of transactions required for authentication is reduced.

2 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This survey reviews the main security issues in the access and core network (vulnerabilities and threats) and provides a classification and categorization of attacks in mobile network and analyze major attacks on 4G mobile networks.
Abstract: Since the 1G of mobile technology, mobile wireless communication systems have continued to evolve, bringing into the network architecture new interfaces and protocols, as well as unified services, high data capacity of data transmission, and packet-based transmission (4G). This evolution has also introduced new vulnerabilities and threats, which can be used to launch attacks on different network components, such as the access network and the core network. These drawbacks stand as a major concern for the security and the performance of mobile networks, since various types of attacks can take down the whole network and cause a denial of service, or perform malicious activities. In this survey, we review the main security issues in the access and core network (vulnerabilities and threats) and provide a classification and categorization of attacks in mobile network. In addition, we analyze major attacks on 4G mobile networks and corresponding countermeasures and current mitigation solutions, discuss limits of current solutions, and highlight open research areas.

92 citations

Proceedings ArticleDOI
14 Apr 2014
TL;DR: The proposed Efficient EPS-AKA protocol is based on the Simple Password Exponential Key Exchange (SPEKE) protocol and is faster, since it uses a secret key method which is faster than certificate-based methods.
Abstract: Long Term Evolution (LTE) networks designed by 3rd Generation Partnership Project (3GPP) represent a widespread technology. LTE is mainly influenced by high data rates, minimum delay and the capacity due to scalable bandwidth and its flexibility. With the rapid and widespread use LTE networks, and increase the use in data/video transmission and Internet applications in general, accordingly, the challenges of securing and speeding up data communication in such networks is also increased. Authentication in LTE networks is very important process because most of the coming attacks occur during this stage. Attackers try to be authenticated and then launch the network resources and prevent the legitimate users from the network services. The basics of Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) are used in LTE AKA protocol which is called Evolved Packet System AKA (EPS-AKA) protocol to secure LTE network, However it still suffers from various vulnerabilities such as disclosure of the user identity, computational overhead, Man In The Middle (MITM) attack and authentication delay. In this paper, an Efficient EPS-AKA protocol (EEPS-AKA) is proposed to overcome those problems. The proposed protocol is based on the Simple Password Exponential Key Exchange (SPEKE) protocol. Compared to previous proposed methods, our method is faster, since it uses a secret key method which is faster than certificate-based methods, In addition, the size of messages exchanged between User Equipment (UE) and Home Subscriber Server (HSS) is reduced, this reduces authentication delay and storage overhead effectively. The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.

57 citations