The next generation of wireless communication
technology known as fourth generation (4G) allows
operators to use new and wider spectrum and
supplements third generation 3G and 3.5G wireless
technologies with higher user data rates, lower
latency and a complete internet protocol(IP) base
network architecture[6].Long Term Evolution
(LTE) and (Worldwide interoperability for
Microwave Access) are the two wireless
technologies that have been considered as aspirants
to achieve the 4G wireless performance objectives,
due to their high speed capability, strong quality of
service(QOS) and wider coverage. There are
number of differences between the 4G wireless
when compared with 3G and other earlier
technologies .The major difference is the fact that
4G wireless network operates entirely on the IP
protocol and architecture, which is what brought
about the similarity between LTE and Wimax.
However, these two technologies also differ from
each other in some other aspects such as network
architecture and security. Consequently, the open
nature and all IP base infrastructure of these 4G
wireless networks have increase security issues
when compared with other wireless technologies
and also significant attention has been given to
security design during the development of both the
LTE and Wimax standards.
The mission of securing 4G wireless networks and
systems is a very challenging one owning that a lot
of sacrifice must be made each time extra security
mechanisms are carried out in its network as an IP
based network, there is an impact on the
performance and traffic handling capacity of the
network and quality of service. The purpose of this
paper is to investigate the evolution of 4G
technology and its security limitations and
challenges, this aim at identifying areas which need
further attention. This will focus mostly on specific
MAC layer security issues that are distinctive to
LTE & Wimax. Secondly, the standardization of
4G wireless network and the evaluation of the
network architecture will be analysed and its
security evolution will be discussed.
The next generation of wireless communication
technology known as fourth generation (4G) allows
operators to use new and wider spectrum and
supplements third generation 3G and 3.5G wireless
technologies with higher user data rates, lower
latency and a complete internet protocol(IP) base
network architecture[6].Long Term Evolution
(LTE) and (Worldwide interoperability for
Microwave Access) are the two wireless
technologies that have been considered as aspirants
to achieve the 4G wireless performance objectives,
due to their high speed capability, strong quality of
service(QOS) and wider coverage. There are
number of differences between the 4G wireless
when compared with 3G and other earlier
technologies .The major difference is the fact that
4G wireless network operates entirely on the IP
protocol and architecture, which is what brought
about the similarity between LTE and Wimax.
However, these two technologies also differ from
each other in some other aspects such as network
architecture and security. Consequently, the open
nature and all IP base infrastructure of these 4G
wireless networks have increase security issues
when compared with other wireless technologies
and also significant attention has been given to
security design during the development of both the
LTE and Wimax standards.
The mission of securing 4G wireless networks and
systems is a very challenging one owning that a lot
of sacrifice must be made each time extra security
mechanisms are carried out in its network as an IP
based network, there is an impact on the
performance and traffic handling capacity of the
network and quality of service. The purpose of this
paper is to investigate the evolution of 4G
technology and its security limitations and
challenges, this aim at identifying areas which need
further attention. This will focus mostly on specific
MAC layer security issues that are distinctive to
LTE & Wimax. Secondly, the standardization of
4G wireless network and the evaluation of the
network architecture will be analysed and its
security evolution will be discussed.
การแปล กรุณารอสักครู่..