This paper is published in Volume-2, Issue-3, 2016
Area
Computer Science Engineering
Author
Divyanshu Malhotra, Dr. Paramjeet Singh, Dr. Shaveta Rani,
Org/Univ
GZSCCET, Bathinda, India
Pub. Date
23 May, 2016
Paper ID
V2I3-1151
Publisher
Keywords
4G authentication, Complex Key, Five Point Key Authentication, FPKA, Authentication & Authorization.

Citationsacebook

IEEE
Divyanshu Malhotra, Dr. Paramjeet Singh, Dr. Shaveta Rani, . Five Point Key Amalgamation For Secure Authentication (FPKA-SA) In 4G Networks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Divyanshu Malhotra, Dr. Paramjeet Singh, Dr. Shaveta Rani, (2016). Five Point Key Amalgamation For Secure Authentication (FPKA-SA) In 4G Networks. International Journal of Advance Research, Ideas and Innovations in Technology, 2(3) www.IJARIIT.com.

MLA
Divyanshu Malhotra, Dr. Paramjeet Singh, Dr. Shaveta Rani, . "Five Point Key Amalgamation For Secure Authentication (FPKA-SA) In 4G Networks." International Journal of Advance Research, Ideas and Innovations in Technology 2.3 (2016). www.IJARIIT.com.

Abstract

The 4G networks are the fourth generation cellular networks and result of the long term evolution (LTE) in the cellular networks area. The fourth generation networks are capable of transferring the user data on higher speeds, which insists the users to have video calls, transfer massive amounts of personal data, etc, which stays at risk while being exchanged between the two nodes. Also, 4G is not only limited to the Smart-phone users, but it is being used for the personal computers (Desktops, Laptops, etc.) using the Mi-Fi interfaces, which adds the high risk of data security. In this paper, a novel authentication mechanism is proposed by using the 5-column key architecture to build and transmit the stronger keys between the two cellular nodes. The proposed model has been evaluated on the basis of various network and authentication performance parameters and compared with the existing 4G authentication models. The proposed model has been found better than the existing model, hence proved to be efficient authentication scheme for 4G networks.