Abstract
Long Term Evolution (LTE) is a fourth-generation mobile communication technology implemented throughout the world. There is still, however, an exposed vulnerability with regard to the identification parameters such as IMSI and RNTI, as they are transmitted in plain text during the initial attach procedure in the access to the LTE network. The vulnerability has existed since the initial release of the LTE Standards, and is still present in Release 12. To prevent a leak of the identification parameters during the initial attach process and a possible third party attack, the relevant parameters should be encrypted. This paper proposes a security scheme to safely transmit identification parameters in different cases of the initial attach. The proposed security scheme solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bikos AN, Sklavos N (2013) LTE/SAE security issues on 4G wireless networks. IEEE Secur Priv 11(2):55–62
Escudero-Andreu G, Raphael CP, Parish DJ (2012) Analysis and design of security for next generation 4G cellular networks. In: The 13th annual post graduate symposium on the convergence of telecommunications, networking and broad-casting (PGNET)
Netmanias (2012) EMM Procedure: 1. Initial attach for unknown UE (Part 1)—case of initial attach. NMC Consulting Group Technical Specifications
Netmanias (2011) EMM Procedure: 1. Initial attach for unknown UE (Part 2)—call flow of initial attach. NMC Consulting Group Technical Specifications
Netmanias (2012) LTE Security I: LTE security concept and authentication. NMC Consulting Group Technical Specifications
Netmanias (2012) LTE Security II: NAS and AS security. NMC Consulting Group Technical Specifications
Kim S (2013) A design of MILENAGE algorithm-based mutual authentication protocol for the protection of initial identifier in LTE. Master’s thesis, Soongsil University
GPP TR 33.821 (2010) Technical specification group services and system aspects; rationale and track of security decisions in long term evolved (LTE) RAN/3GPP system architecture evolution (SAE). Release 9
GPP TS 32.371 (2012) Telecommunication management; security management concept and requirements. Release 10
GPP TS 23.203 (2009) Policy and charging control architecture. Release 10
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Jang, U., Lim, H., Kim, H. (2015). Security Scheme for LTE Initial Attach. In: Park, J., Pan, Y., Chao, HC., Yi, G. (eds) Ubiquitous Computing Application and Wireless Sensor. Lecture Notes in Electrical Engineering, vol 331. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9618-7_6
Download citation
DOI: https://doi.org/10.1007/978-94-017-9618-7_6
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-9617-0
Online ISBN: 978-94-017-9618-7
eBook Packages: EngineeringEngineering (R0)