This paper is published in Volume-2, Issue-3, 2016
Area
Computer Science Engineering
Author
Divyanshu Malhotra, Dr. Paramjeet Singh, Dr. Shaveta Rani,
Org/Univ
GZSCCET, Bathinda, India
Keywords
4G authentication, Complex Key, Five Point Key Authentication, FPKA, Authentication & Authorization.
Citations
IEEE
Divyanshu Malhotra, Dr. Paramjeet Singh, Dr. Shaveta Rani, . Five Point Key Amalgamation For Secure Authentication (FPKA-SA) In 4G Networks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Divyanshu Malhotra, Dr. Paramjeet Singh, Dr. Shaveta Rani, (2016). Five Point Key Amalgamation For Secure Authentication (FPKA-SA) In 4G Networks. International Journal of Advance Research, Ideas and Innovations in Technology, 2(3) www.IJARIIT.com.
MLA
Divyanshu Malhotra, Dr. Paramjeet Singh, Dr. Shaveta Rani, . "Five Point Key Amalgamation For Secure Authentication (FPKA-SA) In 4G Networks." International Journal of Advance Research, Ideas and Innovations in Technology 2.3 (2016). www.IJARIIT.com.
Divyanshu Malhotra, Dr. Paramjeet Singh, Dr. Shaveta Rani, . Five Point Key Amalgamation For Secure Authentication (FPKA-SA) In 4G Networks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Divyanshu Malhotra, Dr. Paramjeet Singh, Dr. Shaveta Rani, (2016). Five Point Key Amalgamation For Secure Authentication (FPKA-SA) In 4G Networks. International Journal of Advance Research, Ideas and Innovations in Technology, 2(3) www.IJARIIT.com.
MLA
Divyanshu Malhotra, Dr. Paramjeet Singh, Dr. Shaveta Rani, . "Five Point Key Amalgamation For Secure Authentication (FPKA-SA) In 4G Networks." International Journal of Advance Research, Ideas and Innovations in Technology 2.3 (2016). www.IJARIIT.com.
Abstract
The 4G networks are the fourth generation cellular networks and result of the long term evolution (LTE) in the cellular networks area. The fourth generation networks are capable of transferring the user data on higher speeds, which insists the users to have video calls, transfer massive amounts of personal data, etc, which stays at risk while being exchanged between the two nodes. Also, 4G is not only limited to the Smart-phone users, but it is being used for the personal computers (Desktops, Laptops, etc.) using the Mi-Fi interfaces, which adds the high risk of data security. In this paper, a novel authentication mechanism is proposed by using the 5-column key architecture to build and transmit the stronger keys between the two cellular nodes. The proposed model has been evaluated on the basis of various network and authentication performance parameters and compared with the existing 4G authentication models. The proposed model has been found better than the existing model, hence proved to be efficient authentication scheme for 4G networks.