This paper is published in Volume-2, Issue-3, 2016
Area
Network Security
Author
Zinnia
Org/Univ
Gurukul Vidyapeeth Banur, Punjab, India
Keywords
AKA, Lightweight key management, LTE authentication, Multi-Factor authentication.
Citations
IEEE
Zinnia. Complex Key Amalgamation Method for Secure Authentication (CKAM-SA) for 4G/LTE Networks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Zinnia (2016). Complex Key Amalgamation Method for Secure Authentication (CKAM-SA) for 4G/LTE Networks. International Journal of Advance Research, Ideas and Innovations in Technology, 2(3) www.IJARIIT.com.
MLA
Zinnia. "Complex Key Amalgamation Method for Secure Authentication (CKAM-SA) for 4G/LTE Networks." International Journal of Advance Research, Ideas and Innovations in Technology 2.3 (2016). www.IJARIIT.com.
Zinnia. Complex Key Amalgamation Method for Secure Authentication (CKAM-SA) for 4G/LTE Networks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Zinnia (2016). Complex Key Amalgamation Method for Secure Authentication (CKAM-SA) for 4G/LTE Networks. International Journal of Advance Research, Ideas and Innovations in Technology, 2(3) www.IJARIIT.com.
MLA
Zinnia. "Complex Key Amalgamation Method for Secure Authentication (CKAM-SA) for 4G/LTE Networks." International Journal of Advance Research, Ideas and Innovations in Technology 2.3 (2016). www.IJARIIT.com.
Abstract
It is normal that a scope of security dangers will develop in 4G remote because of various components including: Takeoff from restrictive working frameworks for handheld gadgets to open and institutionalized working frameworks open nature of the system structural planning and conventions (IP-based). With this move to open conventions and principles, 4G remote systems are currently vulnerable to PC assault methods exhibit on 70 the Internet. Such systems will be progressively powerless against a scope of security assaults, including for instance Malware, Trojans and Viruses. Aside from end-client hardware posturing conventional security dangers, it is normal that new patterns, for example, SPIT (SPAM for VoIP) will likewise turn into a security concern in 4G LTE and WiMAX. Other VoIP-related security dangers are likewise conceivable; for example, SIP enrolment commandeering where the IP location of the criminal is built into the bundle header, along these lines, overwriting the right IP address. In the proposed model, the major focus has been shifted over the robust and secure authentication key mechanism for the 4G/LTE models to add the higher level to the security of the 4G/LTE networks. The complex key mechanism has been designed for the generation of the complex key to add the higher level of security to the 4G/LTE networks channels. The experimental results have justified the performance of the proposed model in the terms of time complexity, uniqueness of the keys, etc.