Share This Article:

Local Gateway Assisted Handover Key Derivation in Enterprise Femtocell Network

Abstract Full-Text HTML Download Download as PDF (Size:289KB) PP. 70-78
DOI: 10.4236/ijcns.2015.84009    2,378 Downloads   2,657 Views   Citations

ABSTRACT

With the dense deployment of femtocells in enterprise femtocell network and the small coverage of femtocells, handover in enterprise femtocell network will be frequent. The general handover key derivation method which is used in handover procedures in LTE is not suitable for handover in this scenario because of its long time cost and the weak security. To solve this problem, this paper has proposed a new local gateway assisted handover key derivation schema in enterprise femtocell network. It can meet the fast derivation and good forward/backward key secrecy requirement of handover key derivation in enterprise femtocell network. The simulation result has verified that the proposed handover key derivation schema works better than the existing method.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Wang, P. and Zhang, X. (2015) Local Gateway Assisted Handover Key Derivation in Enterprise Femtocell Network. International Journal of Communications, Network and System Sciences, 8, 70-78. doi: 10.4236/ijcns.2015.84009.

References

[1] Jaime, F., Josep, M.B., José, N.M. and Frank, Z. (2012) Traffic and Mobility Management in Networks of Femtocells. Mobile Networks and Applications, 17, 662-673. http://dx.doi.org/10.1007/s11036-012-0396-9
[2] Broadband Evolved FEMTO Networks (BeFEMTO) Project (2011) The BeFEMTO System Architecture. http://www.ict-befemto.eu/publications/deliverables.html
[3] Zdarsky, F., Maeder, A., Al-Sabea, S. and Schmid, S. (2011) Localization of Data and Control Plane Traffic in Enterprise Femtocell Networks. Proceedings of IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, 15-18 May 2011. http://dx.doi.org/10.1109/VETECS.2011.5956622
[4] 3rd Generation Partnership Project (2012) Technical Specification Group Service and System Aspects; 3GPP System Architecture Evolution (SAE); Security Architecture (Rel 12) 3GPP TS 33.401 V12.6.0.
[5] 3rd Generation Partnership Project (2011) Technical Specification Group Services and System Aspects; General Packet Radio Service (GPRS) Enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) Access (Rel 10), 3GPP TS 23.401 V10.5.0.
[6] 3rd Generation Partnership Project (2011) Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; (Rel 10), 3GPP TS 36.300 V10.4.0.
[7] Forsberg, D. (2010) LTE Key Management Analysis with Session Keys Context. Computer Communications, 33, 1907-1915. http://dx.doi.org/10.1016/j.comcom.2010.07.002
[8] Bohk, A., Buttyn, L. and Dra, L. (2007) An Authentication Scheme for Fast Handover between WiFi Access Points. Proceeding of ACM Wireless Internet Conference (WICON 2007), October, 22-24. http://dx.doi.org/10.4108/wicon.2007.2282
[9] Cai, L., Machiraju, S. and Chen, H. (2010) CapAuth: A Capability-Based Handover Scheme. Proceedings of IEEE INFOCOM 2010, USA, March, 1-5. http://dx.doi.org/10.1109/INFCOM.2010.5462208
[10] Jin, C., Hui, L., Maode, M., Yueyu, Z. and Chengzhe, L. (2012) A Simple and Robust Handover Authentication between HeNB and eNB in LTE Networks. Computer Networks, 56, 2119-2131. http://dx.doi.org/10.1016/j.comnet.2012.02.012
[11] Choi, J. and Jung, S. (2010) A Handover Authentication Using Credentials Based on Chameleon Hashing. IEEE Communications Letters, 14, 54-56. http://dx.doi.org/10.1109/LCOMM.2010.01.091607
[12] Roh, H. and Jung, S. (2010) RSA-Based Proxy Signature for Media Independent Handover. Proceeding of the First International Conference on Smart IT Applications (SITA 2010), September.
[13] Qi, J., Zhang, Y., Fu, A. and Liu, X. (2011) A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks. Proceeding of GLOBECOM 2011, December, 1-6.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.