Do you want to publish a course? Click here

Evaluate the performance of the authentication protocols in cellular networks according to the quality of service

تقييم أداء بروتوكولات المصادقة في الشبكات الخلوية وفقاً لجودة الخدمة

1696   0   241   0 ( 0 )
 Publication date 2015
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

LTE’s success as a high throughput, and umbrella technology for wireless networks is highly affected by the researchers’ capability of solving its current security vulnerabilities. Mutual authentication was adopted by mobile networks to overcome vulnerabilities exploited by “IMSI catcher” and other active attacks. 3GPP’s mutual authentication implementation in EPS AKA succeeded in enhancing the network’s security, but failed to cover weaknesses inherited from its predecessor (UMTS). One of those vulnerabilities is the passive capturing of IMSIs during user identification in the Authentication and Key Agreement protocol. Many researchers tried over the past years, to propose an alternative for EPS AKA, able to ensure high levels of security and offer acceptable QoS performance. In this paper, we will crypt-analyze (SPAKA and PBKP) which was claimed to solve EPS AKA’s privacy and mutual authentication weaknesses, then we will compare its QoS performance to EC-AKA and EPS AKA. Our proposed protocol “EC-AKA” is a real candidate to replace the current authentication and Key Agreement protocol, because of its excellent performance in all the studied parameters.

References used
KATARIA,J;BANSAL,A.Exploration of GSM & UMTS security architecture with AKA protocol. International Journal of Scientific and Research.Vol.3,No.2,2013,2250-3153
TSAY,S; STIG, F. A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. Norwegian University,2010,12
BHUSAL,A.Is the Session Mix-up Attack on the UMTS/LTE AKA Protocol Practical. Norwegian University of Science and Technology,2013,96
rate research

Read More

The low cost, ease of deployment has exposed WSNs an attractive choice for numerous applications,like environmental monitoring applications , security applications, real time tracking, and so on. But in reality, these networks are operated on batte ry with limitations in their computation capabilities, memory, bandwidth ,so they called networks with resource constrained nature, and this impels various challenges in its design and its performance. Limited battery capacity of sensor nodes makes energy efficiency a major and challenge problem in wireless sensor networks. Thus, the routing protocols for wireless sensor networks must be energy efficient in order to maximize the network lifetime. In this paper we simulated LEACH,SEP,DEEC,TEEN routing protocols and evaluated their performance by comparing with DT routing protocol in Homogeneous and Heterogeneous Wireless Sensor Networks on MATLAB.
Wireless sensor network simulation programs provide representation for an actual system, without needing to deploy real testbed which is highly constrained by the available budget, and the direct operations inside physical layer in most of these prog rams are hidden and work implicitly. This is what motivated us to build a kernel for a virtual simulation platform to be able to simulate protocol operations and algorithms at the node processing unit level, The proposed system aims to observe the execution of operations at the low level of the wireless sensor physical infrastructure with the ability to modify at this level. Since secure routing is considered one of the most challenges in WSN field, so we apply in this paper one of the secure routing algorithms inside the GUI of the proposed system to observe execution at the low level of processor operations, which give us the ability to discover the weakness of algorithms and improve them. Three scenarios were applied to evaluate the performance of the proposed simulation platform. The results demonstrate a high flexibility and effectiveness of this platform in tracing the progress of operations performed within the wireless sensor nodes at the Assembly language level.
Mobile wireless networks consist of a set of cooperative and mobile nodes, each node can move randomly at a specific speed in all directions without any control of a central manager. This type of networks has become a hot research topic due to its military application and suitability for emergencies and natural disasters. Due to the lack of fixed infrastructure, the routing process becomes the major problem in this type of networks, where the responsibility of routing is transferred to each node. Over the last few years, a number of traditional routing protocols has been proposed, but these protocols do not support quality of service in different environments. Some studies have improved some of these protocols to support quality of service for specific environments. This research identifies and analysis some of these improved protocols.
Research paper on the TCP protocol and its handling of bottlenecks, with a simple comparison between several copies of the protocol.
comments
Fetching comments Fetching comments
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا