2017 IEEE Wireless Communications and Networking Conference (WCNC) 2017
DOI: 10.1109/wcnc.2017.7925678
|View full text |Cite
|
Sign up to set email alerts
|

On the Handover Security Key Update and Residence Management in LTE Networks

Abstract: Abstract-In LTE networks, key update and residence management have been investigated as an effective solution to cope with desynchronization attacks in mobility management entity (MME) handovers. In this paper, we first analyse the impacts of the key update interval (KUI) and MME residence interval (MRI) on the handover performance in terms of the number of exposed packets (NEP) and signaling overhead rate (SOR). By deriving the bounds of the NEP and SOR over the KUI and MRI, it is shown that there exists a tr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Specifically, in Fig. 10(a), the initial population of fireflies are generated over the 2-D grid with a notice that their location should satisfy the OPV constraint (33) where the the target maximum OPV and the vulnerable interval threshold are α = 0.01 and τ th = 5 seconds, respectively. It can be observed in Fig.…”
Section: E Optimal Kui and Mri With Fa Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…Specifically, in Fig. 10(a), the initial population of fireflies are generated over the 2-D grid with a notice that their location should satisfy the OPV constraint (33) where the the target maximum OPV and the vulnerable interval threshold are α = 0.01 and τ th = 5 seconds, respectively. It can be observed in Fig.…”
Section: E Optimal Kui and Mri With Fa Approachmentioning
confidence: 99%
“…This work is extended from[33] where only the impacts of the KUI and MRI were considered on the optimisation of handover security performance. We now take a further step with the analysis of the OPV and the proposal of two approaches for solving the developed MO problem.…”
mentioning
confidence: 99%