However, this new scheme implicates several undesirable
features to the system, increasing the required authentication
traffic load to complete an AKA process and forcing the
operators to acquire biometric parameters for each user and
store them on the core network.
Moreover, paper [16] recommends an alternative
communication framework, called Y-comm, which offer
a common scheme to interconnect dissimilar accessing
technologies such WiMAX, Wireless or Ethernet local
networks, but sharing the same security environment.
This framework is designed to provide an impenetrable
system, where each level is protected enough to evade potential
attacks. Unfortunately, a reformation of the entire mobile
system without considering the previous schemes may result
in relevant cost expenses and extra effort, making this idea
less interesting for the operators.
V. CONCLUSION
Mass effort has been made in order to protect and guarantee
secure mobile communications towards LTE infrastructure
since the earlier releases of 3GPP specifications. However,
future improvement is required to neutralize the actual
attacks and vulnerabilities that may compromise the user
identity, data privacy, signalling traffic as well as access and
core-network equipment.
Mobile services have become an integral part of our life,
using them as payment method or storing private information.
Secure communications are mandatory, in order to reduce
the impact of eavesdropping attacks or impersonations of
legitimate network equipment. Future research is required in
order to tackle improvement into the EPS, counteracting the
actual threats and to solve the identified weaknesses.
VI. FUTURE RESEARCH
There are many issues regarding to the threats and
vulnerabilities mentioned above that should be investigated
widely to find alternative solutions that accomplish all the
security requirements proposed on 3GPP specifications.
Our research is focused on the evaluation of all the AKA
alternatives proposed by research groups using Casper/FDR,
a testing tool to evaluate security protocols modeled by
functional programming. Identification of further weaknesses
is essential to design better security environments for the 4G
Moreover, a enhanced solution will be proposed to cope
with all the identified threats and minimize the authentication
traffic during the AKA phase, considering a fully backward
compatibility without inflicting further menaces into the
system. The solution will be evaluated and simulated in
OPNET, a tool to analyze and design simulated networks,
protocols and devices.
However, this new scheme implicates several undesirable
features to the system, increasing the required authentication
traffic load to complete an AKA process and forcing the
operators to acquire biometric parameters for each user and
store them on the core network.
Moreover, paper [16] recommends an alternative
communication framework, called Y-comm, which offer
a common scheme to interconnect dissimilar accessing
technologies such WiMAX, Wireless or Ethernet local
networks, but sharing the same security environment.
This framework is designed to provide an impenetrable
system, where each level is protected enough to evade potential
attacks. Unfortunately, a reformation of the entire mobile
system without considering the previous schemes may result
in relevant cost expenses and extra effort, making this idea
less interesting for the operators.
V. CONCLUSION
Mass effort has been made in order to protect and guarantee
secure mobile communications towards LTE infrastructure
since the earlier releases of 3GPP specifications. However,
future improvement is required to neutralize the actual
attacks and vulnerabilities that may compromise the user
identity, data privacy, signalling traffic as well as access and
core-network equipment.
Mobile services have become an integral part of our life,
using them as payment method or storing private information.
Secure communications are mandatory, in order to reduce
the impact of eavesdropping attacks or impersonations of
legitimate network equipment. Future research is required in
order to tackle improvement into the EPS, counteracting the
actual threats and to solve the identified weaknesses.
VI. FUTURE RESEARCH
There are many issues regarding to the threats and
vulnerabilities mentioned above that should be investigated
widely to find alternative solutions that accomplish all the
security requirements proposed on 3GPP specifications.
Our research is focused on the evaluation of all the AKA
alternatives proposed by research groups using Casper/FDR,
a testing tool to evaluate security protocols modeled by
functional programming. Identification of further weaknesses
is essential to design better security environments for the 4G
Moreover, a enhanced solution will be proposed to cope
with all the identified threats and minimize the authentication
traffic during the AKA phase, considering a fully backward
compatibility without inflicting further menaces into the
system. The solution will be evaluated and simulated in
OPNET, a tool to analyze and design simulated networks,
protocols and devices.
การแปล กรุณารอสักครู่..
