User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular SystemUser-to-User Mutual Authentication and Key Agreement Scheme • December 20th, 2023
Contract Type FiledDecember 20th, 2023Long Term Evolution LTE is the first technology that pro- vides exclusively packet-switched data and modifies the security architecture of the 2G and 3G systems. The LTE security architecture offers confidentiality, access control, a kind of obscurity and mutual authentication. However, numerous types of attacks can be encountered during the mutual authentication process which is a challenge- response based technique. Therefore, a high secure public key algorithm can be implemented to improve the network security services. As the network operator is often con- sidered as not being a highly trusted party and can thus face threats, the communications ends are the only secure parties to provide such security features. This paper pro- poses a secure mutual authentication and key agreement scheme for LTE cellular system with user-to-user secu- rity. The network side in this scheme operates as a proxy and non-trusted party to provide the security architecture with more flexibility and reliab
User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular SystemUser-to-User Mutual Authentication and Key Agreement Scheme • October 9th, 2015
Contract Type FiledOctober 9th, 2015Long Term Evolution LTE is the first technology that pro- vides exclusively packet-switched data and modifies the security architecture of the 2G and 3G systems. The LTE security architecture offers confidentiality, access control, a kind of obscurity and mutual authentication. However, numerous types of attacks can be encountered during the mutual authentication process which is a challenge- response based technique. Therefore, a high secure public key algorithm can be implemented to improve the network security services. As the network operator is often con- sidered as not being a highly trusted party and can thus face threats, the communications ends are the only secure parties to provide such security features. This paper pro- poses a secure mutual authentication and key agreement scheme for LTE cellular system with user-to-user secu- rity. The network side in this scheme operates as a proxy and non-trusted party to provide the security architecture with more flexibility and reliab