Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme Article Swipe
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.1016/j.procs.2016.06.033
The core objective of 3GPP Long Term Evolution (LTE) is to provide a secured communication and high data rate for 4G users. Even though 4G network provides security, there are loopholes which lead to several attacks in 4G network. One such attack is desynchronization attack in 3GPP handover key management. This paper deliberates the vulnerability of desynchronization attack that occurs when source acts as rogue base station in 3GPP. In addition, it discusses how this attack jeopardizes the communication in 4G network and subsequently proposes a new scheme to overcome this attack. In the proposed scheme, the target generates its own key rather than using the key generated by source node for future communication with target to achieve a secure communication between the source and target base station in 4G LTE. The proposed scheme is simulated using network simulator 3 (NS-3). The numerical analysis shows that the proposed scheme achieves a significant reduction in the communication cost for key generation and authentication in LTE.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1016/j.procs.2016.06.033
- OA Status
- diamond
- Cited By
- 15
- References
- 7
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2515590633
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2515590633Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.procs.2016.06.033Digital Object Identifier
- Title
-
Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication SchemeWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2016Year of publication
- Publication date
-
2016-01-01Full publication date if available
- Authors
-
Senthilkumar Mathi, Lavanya DharumanList of authors in order
- Landing page
-
https://doi.org/10.1016/j.procs.2016.06.033Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1016/j.procs.2016.06.033Direct OA link when available
- Concepts
-
Computer science, Scheme (mathematics), Authentication (law), Computer network, Computer security, Mathematics, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
15Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 2, 2022: 2, 2020: 2, 2019: 4, 2018: 2Per-year citation counts (last 5 years)
- References (count)
-
7Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2515590633 |
|---|---|
| doi | https://doi.org/10.1016/j.procs.2016.06.033 |
| ids.doi | https://doi.org/10.1016/j.procs.2016.06.033 |
| ids.mag | 2515590633 |
| ids.openalex | https://openalex.org/W2515590633 |
| fwci | 2.68681658 |
| type | article |
| title | Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme |
| biblio.issue | |
| biblio.volume | 89 |
| biblio.last_page | 179 |
| biblio.first_page | 170 |
| topics[0].id | https://openalex.org/T11504 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9947999715805054 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Advanced Authentication Protocols Security |
| topics[1].id | https://openalex.org/T11932 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9656000137329102 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2204 |
| topics[1].subfield.display_name | Biomedical Engineering |
| topics[1].display_name | Wireless Body Area Networks |
| topics[2].id | https://openalex.org/T10964 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9506000280380249 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2208 |
| topics[2].subfield.display_name | Electrical and Electronic Engineering |
| topics[2].display_name | Wireless Communication Security Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.9323134422302246 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C77618280 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6596099138259888 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[1].display_name | Scheme (mathematics) |
| concepts[2].id | https://openalex.org/C148417208 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5294204354286194 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[2].display_name | Authentication (law) |
| concepts[3].id | https://openalex.org/C31258907 |
| concepts[3].level | 1 |
| concepts[3].score | 0.5250449180603027 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[3].display_name | Computer network |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.4739912748336792 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C33923547 |
| concepts[5].level | 0 |
| concepts[5].score | 0.0 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[5].display_name | Mathematics |
| concepts[6].id | https://openalex.org/C134306372 |
| concepts[6].level | 1 |
| concepts[6].score | 0.0 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[6].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.9323134422302246 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/scheme |
| keywords[1].score | 0.6596099138259888 |
| keywords[1].display_name | Scheme (mathematics) |
| keywords[2].id | https://openalex.org/keywords/authentication |
| keywords[2].score | 0.5294204354286194 |
| keywords[2].display_name | Authentication (law) |
| keywords[3].id | https://openalex.org/keywords/computer-network |
| keywords[3].score | 0.5250449180603027 |
| keywords[3].display_name | Computer network |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.4739912748336792 |
| keywords[4].display_name | Computer security |
| language | en |
| locations[0].id | doi:10.1016/j.procs.2016.06.033 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S120348307 |
| locations[0].source.issn | 1877-0509 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1877-0509 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Procedia Computer Science |
| locations[0].source.host_organization | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_name | Elsevier BV |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_lineage_names | Elsevier BV |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Procedia Computer Science |
| locations[0].landing_page_url | https://doi.org/10.1016/j.procs.2016.06.033 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5018462739 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-7134-8448 |
| authorships[0].author.display_name | Senthilkumar Mathi |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I81556334 |
| authorships[0].affiliations[0].raw_affiliation_string | Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Amrita University, Coimbatore, Tamilnadu, India |
| authorships[0].institutions[0].id | https://openalex.org/I81556334 |
| authorships[0].institutions[0].ror | https://ror.org/03am10p12 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I81556334 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Amrita Vishwa Vidyapeetham |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Senthilkumar Mathi |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Amrita University, Coimbatore, Tamilnadu, India |
| authorships[1].author.id | https://openalex.org/A5071730442 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Lavanya Dharuman |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I81556334 |
| authorships[1].affiliations[0].raw_affiliation_string | Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Amrita University, Coimbatore, Tamilnadu, India |
| authorships[1].institutions[0].id | https://openalex.org/I81556334 |
| authorships[1].institutions[0].ror | https://ror.org/03am10p12 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I81556334 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Amrita Vishwa Vidyapeetham |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Lavanya Dharuman |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Amrita University, Coimbatore, Tamilnadu, India |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1016/j.procs.2016.06.033 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11504 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9947999715805054 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Advanced Authentication Protocols Security |
| related_works | https://openalex.org/W2748952813, https://openalex.org/W2390279801, https://openalex.org/W2358668433, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W2382290278, https://openalex.org/W2478288626, https://openalex.org/W4391913857, https://openalex.org/W2242172122, https://openalex.org/W2912135041 |
| cited_by_count | 15 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 2 |
| counts_by_year[1].year | 2022 |
| counts_by_year[1].cited_by_count | 2 |
| counts_by_year[2].year | 2020 |
| counts_by_year[2].cited_by_count | 2 |
| counts_by_year[3].year | 2019 |
| counts_by_year[3].cited_by_count | 4 |
| counts_by_year[4].year | 2018 |
| counts_by_year[4].cited_by_count | 2 |
| counts_by_year[5].year | 2017 |
| counts_by_year[5].cited_by_count | 3 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1016/j.procs.2016.06.033 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S120348307 |
| best_oa_location.source.issn | 1877-0509 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1877-0509 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Procedia Computer Science |
| best_oa_location.source.host_organization | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_name | Elsevier BV |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_lineage_names | Elsevier BV |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Procedia Computer Science |
| best_oa_location.landing_page_url | https://doi.org/10.1016/j.procs.2016.06.033 |
| primary_location.id | doi:10.1016/j.procs.2016.06.033 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S120348307 |
| primary_location.source.issn | 1877-0509 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1877-0509 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Procedia Computer Science |
| primary_location.source.host_organization | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_name | Elsevier BV |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_lineage_names | Elsevier BV |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Procedia Computer Science |
| primary_location.landing_page_url | https://doi.org/10.1016/j.procs.2016.06.033 |
| publication_date | 2016-01-01 |
| publication_year | 2016 |
| referenced_works | https://openalex.org/W2112112264, https://openalex.org/W1966521004, https://openalex.org/W2025653731, https://openalex.org/W2304968450, https://openalex.org/W793893796, https://openalex.org/W2341642061, https://openalex.org/W2586495469 |
| referenced_works_count | 7 |
| abstract_inverted_index.3 | 139 |
| abstract_inverted_index.a | 12, 85, 118, 150 |
| abstract_inverted_index.4G | 20, 24, 37, 80, 129 |
| abstract_inverted_index.In | 69, 92 |
| abstract_inverted_index.as | 63 |
| abstract_inverted_index.by | 108 |
| abstract_inverted_index.in | 36, 45, 67, 79, 128, 153, 162 |
| abstract_inverted_index.is | 9, 42, 134 |
| abstract_inverted_index.it | 71 |
| abstract_inverted_index.of | 3, 55 |
| abstract_inverted_index.to | 10, 33, 88, 116 |
| abstract_inverted_index.One | 39 |
| abstract_inverted_index.The | 0, 131, 141 |
| abstract_inverted_index.and | 15, 82, 124, 160 |
| abstract_inverted_index.are | 29 |
| abstract_inverted_index.for | 19, 111, 157 |
| abstract_inverted_index.how | 73 |
| abstract_inverted_index.its | 99 |
| abstract_inverted_index.key | 48, 101, 106, 158 |
| abstract_inverted_index.new | 86 |
| abstract_inverted_index.own | 100 |
| abstract_inverted_index.the | 53, 77, 93, 96, 105, 122, 146, 154 |
| abstract_inverted_index.3GPP | 4, 46 |
| abstract_inverted_index.Even | 22 |
| abstract_inverted_index.LTE. | 130, 163 |
| abstract_inverted_index.Long | 5 |
| abstract_inverted_index.Term | 6 |
| abstract_inverted_index.This | 50 |
| abstract_inverted_index.acts | 62 |
| abstract_inverted_index.base | 65, 126 |
| abstract_inverted_index.core | 1 |
| abstract_inverted_index.cost | 156 |
| abstract_inverted_index.data | 17 |
| abstract_inverted_index.high | 16 |
| abstract_inverted_index.lead | 32 |
| abstract_inverted_index.node | 110 |
| abstract_inverted_index.rate | 18 |
| abstract_inverted_index.such | 40 |
| abstract_inverted_index.than | 103 |
| abstract_inverted_index.that | 58, 145 |
| abstract_inverted_index.this | 74, 90 |
| abstract_inverted_index.when | 60 |
| abstract_inverted_index.with | 114 |
| abstract_inverted_index.(LTE) | 8 |
| abstract_inverted_index.3GPP. | 68 |
| abstract_inverted_index.paper | 51 |
| abstract_inverted_index.rogue | 64 |
| abstract_inverted_index.shows | 144 |
| abstract_inverted_index.there | 28 |
| abstract_inverted_index.using | 104, 136 |
| abstract_inverted_index.which | 31 |
| abstract_inverted_index.attack | 41, 44, 57, 75 |
| abstract_inverted_index.future | 112 |
| abstract_inverted_index.occurs | 59 |
| abstract_inverted_index.rather | 102 |
| abstract_inverted_index.scheme | 87, 133, 148 |
| abstract_inverted_index.secure | 119 |
| abstract_inverted_index.source | 61, 109, 123 |
| abstract_inverted_index.target | 97, 115, 125 |
| abstract_inverted_index.though | 23 |
| abstract_inverted_index.users. | 21 |
| abstract_inverted_index.(NS-3). | 140 |
| abstract_inverted_index.achieve | 117 |
| abstract_inverted_index.attack. | 91 |
| abstract_inverted_index.attacks | 35 |
| abstract_inverted_index.between | 121 |
| abstract_inverted_index.network | 25, 81, 137 |
| abstract_inverted_index.provide | 11 |
| abstract_inverted_index.scheme, | 95 |
| abstract_inverted_index.secured | 13 |
| abstract_inverted_index.several | 34 |
| abstract_inverted_index.station | 66, 127 |
| abstract_inverted_index.achieves | 149 |
| abstract_inverted_index.analysis | 143 |
| abstract_inverted_index.handover | 47 |
| abstract_inverted_index.network. | 38 |
| abstract_inverted_index.overcome | 89 |
| abstract_inverted_index.proposed | 94, 132, 147 |
| abstract_inverted_index.proposes | 84 |
| abstract_inverted_index.provides | 26 |
| abstract_inverted_index.Evolution | 7 |
| abstract_inverted_index.addition, | 70 |
| abstract_inverted_index.discusses | 72 |
| abstract_inverted_index.generated | 107 |
| abstract_inverted_index.generates | 98 |
| abstract_inverted_index.loopholes | 30 |
| abstract_inverted_index.numerical | 142 |
| abstract_inverted_index.objective | 2 |
| abstract_inverted_index.reduction | 152 |
| abstract_inverted_index.security, | 27 |
| abstract_inverted_index.simulated | 135 |
| abstract_inverted_index.simulator | 138 |
| abstract_inverted_index.generation | 159 |
| abstract_inverted_index.deliberates | 52 |
| abstract_inverted_index.jeopardizes | 76 |
| abstract_inverted_index.management. | 49 |
| abstract_inverted_index.significant | 151 |
| abstract_inverted_index.subsequently | 83 |
| abstract_inverted_index.communication | 14, 78, 113, 120, 155 |
| abstract_inverted_index.vulnerability | 54 |
| abstract_inverted_index.authentication | 161 |
| abstract_inverted_index.desynchronization | 43, 56 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 94 |
| corresponding_author_ids | https://openalex.org/A5018462739 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| corresponding_institution_ids | https://openalex.org/I81556334 |
| citation_normalized_percentile.value | 0.91460174 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |