Skip to main content

Security Scheme for LTE Initial Attach

  • Conference paper
  • First Online:
Ubiquitous Computing Application and Wireless Sensor

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 331))

  • 1590 Accesses

Abstract

Long Term Evolution (LTE) is a fourth-generation mobile communication technology implemented throughout the world. There is still, however, an exposed vulnerability with regard to the identification parameters such as IMSI and RNTI, as they are transmitted in plain text during the initial attach procedure in the access to the LTE network. The vulnerability has existed since the initial release of the LTE Standards, and is still present in Release 12. To prevent a leak of the identification parameters during the initial attach process and a possible third party attack, the relevant parameters should be encrypted. This paper proposes a security scheme to safely transmit identification parameters in different cases of the initial attach. The proposed security scheme solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bikos AN, Sklavos N (2013) LTE/SAE security issues on 4G wireless networks. IEEE Secur Priv 11(2):55–62

    Google Scholar 

  2. Escudero-Andreu G, Raphael CP, Parish DJ (2012) Analysis and design of security for next generation 4G cellular networks. In: The 13th annual post graduate symposium on the convergence of telecommunications, networking and broad-casting (PGNET)

    Google Scholar 

  3. Netmanias (2012) EMM Procedure: 1. Initial attach for unknown UE (Part 1)—case of initial attach. NMC Consulting Group Technical Specifications

    Google Scholar 

  4. Netmanias (2011) EMM Procedure: 1. Initial attach for unknown UE (Part 2)—call flow of initial attach. NMC Consulting Group Technical Specifications

    Google Scholar 

  5. Netmanias (2012) LTE Security I: LTE security concept and authentication. NMC Consulting Group Technical Specifications

    Google Scholar 

  6. Netmanias (2012) LTE Security II: NAS and AS security. NMC Consulting Group Technical Specifications

    Google Scholar 

  7. Kim S (2013) A design of MILENAGE algorithm-based mutual authentication protocol for the protection of initial identifier in LTE. Master’s thesis, Soongsil University

    Google Scholar 

  8. GPP TR 33.821 (2010) Technical specification group services and system aspects; rationale and track of security decisions in long term evolved (LTE) RAN/3GPP system architecture evolution (SAE). Release 9

    Google Scholar 

  9. GPP TS 32.371 (2012) Telecommunication management; security management concept and requirements. Release 10

    Google Scholar 

  10. GPP TS 23.203 (2009) Policy and charging control architecture. Release 10

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyungjoo Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Jang, U., Lim, H., Kim, H. (2015). Security Scheme for LTE Initial Attach. In: Park, J., Pan, Y., Chao, HC., Yi, G. (eds) Ubiquitous Computing Application and Wireless Sensor. Lecture Notes in Electrical Engineering, vol 331. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9618-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-9618-7_6

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-9617-0

  • Online ISBN: 978-94-017-9618-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics