• Login
  • Help Guide
View Item 
  •   JOOUST IR Home
  • Journal Articles
  • School of Agriculture and Food Science
  • View Item
  •   JOOUST IR Home
  • Journal Articles
  • School of Agriculture and Food Science
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

GUTI-Based Multi-Factor Authentication Protocol for De-synchronization Attack Prevention in LTE Handovers

Thumbnail
Publication Date
2020
Author
Nyangaresi, Vincent Omollo
Abeka, Silvance O.
Rodrigues, Anthony J.
Type
Article
Metadata
Show full item record
Abstract/Overview

The motivations behind the long term evolution(LTE)networks are low latency, high bandwidths and high data rates. The low latency requirement is tricky and cumbersome to achieve during handovers given that the communication process requires secure and privacy-preserving strategies and hence the introduction of authentication and encryption. Increased latency at cell boundaries leads to packet losses which results in denial of services, and is there as on behind lack of authentication during handover process in some cellular networks such as 2G. Unauthenticated handovers expose cellular communication to attacks such as eavesdropping, illicit modifications and traffic re-direction, all which compromise both confidentiality and integrity of the exchanged data. As such, a number of researchers have developed authentication strategies such as ticketing and group key security. However, these approaches concentrate on the security aspects of the handovers, ignoring the latency issues. In this paper, LTE tracking area partitioning is combined with advance figures of merit measuring and buffering to reduce latencies during the handover process, and hence permitted the incorporation of handover entities authentication. The simulation results indicated that our approach reduced the handover latency from 2.598 seconds for handovers without timing advance to an average latency of 0.048 seconds. In addition, a GUTI based authentication protocol was implemented that was observed to be resistant against attacks such as denial of service, de-synchronization, session hijacking, masquerade and network impersonation.

Subject/Keywords
De-synchronization; Handovers; Multi-factor authentication; Neuro-fuzzy; Lowlatency; LTE security
Publisher
International Journal of Cyber-Security and Digital Forensics (IJCSDF)
ISSN
2305-0011
Permalink
http://ir.jooust.ac.ke:8080/xmlui/handle/123456789/8869
Collections
  • School of Agriculture and Food Science [179]

Browse

All of JOOUST IRCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Statistics

View Usage Statistics

Contact Us

Copyright © 2023-4 Jaramogi Oginga Odinga University of Science and Technology (JOOUST)
P.O. Box 210 - 40601
Bondo – Kenya

Useful Links

  • Report a problem with the content
  • Accessibility Policy
  • Deaccession/Takedown Policy

TwitterFacebookYouTubeInstagram

  • University Policies
  • Access to Information
  • JOOUST Quality Statement