Analysis of Quantum Key Distribution in LTE-A Network
Abstract
LTE-A is a standard for wireless communication developed by 3GPP LTE release 10, which enhances the existing LTE network for supporting higher data usage, low latencies and better spectral efficiency. Security is the one of the challenge in LTE-A network. Some security risks are modification, injection and eavesdropping attacks. Another challenge in LTE-A network is resource utilization. Due to the multiple key management mechanisms, the complexity of LTE-A network is increase. An existing system utilized Elliptic Curve-Diffie Hellman Key Exchange algorithm which establish a shared secret key over communication channel. The drawbacks of ECDH are computational cost and communication cost is relatively high. In this paper, we propose an efficient key distribution technique called Quantum Key Distribution. This technique improves the security as well as utilizes the resources effectively. The proposed scheme includes BB84 protocol, which uses the properties of quantum mechanism for detecting attackers and unconditional security. Using this system we achieve maximum security level compared with existing technique.
Keywords
Full Text:
PDFReferences
Aloy Anuja Mary. G, Chellappan. C, “Solving Heuristic Attacks using Elipitic Curve cryptography in Quantum Computer”, Journal of Theoretical and Applied Information Technology, Vol. 53, No. 1, ISSN: 1992-8645.
Anghel. C, “Research, Development and Simulation of Quantum Cryptographic Protocols”, ELEKTRONIKA IR ELEKTROTECHNIKA, Vol. 19, No. 4, ISSN: 1392-1215, 2013.
Dipti Aglawe, Samta Gajbhiye, “Software implementation of Cyclic Abelian Elliptic Curve using Matlab”, International Journal of Computer Applications, Volume. 42, No. 6, March 2012.
Jin Wang, Zhongqi Zhang, Yongjun Ren, Bin Li and Jeong-Uk Kim, “Issues toward Networks Architecture Security for LTE and LTE-A Networks”, International Journal of Security and Its Applications, Volume. 8, No.4, pp. 17-24, 2014.
Kartheek D N, Praveen Kumar, Srujan.S, “Security Using BB84 Quantum Key Distribution Protocols”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume. 2, Issue. 5, May 2012.
Karpagam.N, Nithya. S, “Enhancing the Security and Reliability for Data Transmission in Wireless Networks”, International Journal of Scientific Research Engineering & Technology (IJSRET), Volume. 4, Issue. 3, March 2015.
Lalu Naik. R, Chenna Reddy. P, Sathish Kumar. U, Narayana .Y.V, “Quantum Cryptography with Key Distribution in Wireless Networks on Privacy Amplification”, International Journal of Computer Networks and Wireless Communication (IJCNWC), Volume. 1, No. 1, December 2011.
Masoumeh Purkhiabani and Ahmad Salahi, “Enhanced Authentication and Key Agreement Procedure of Next Generation 3GPP Mobile Networks”, International Journal of Information and Electronics Engineering, Vol. 2, No. 1, January 2012.
Murali. G, Sivaram Prasad. R, Bhaskar Rao .K.V, “Effective User Authentication using Quantum Key Distribution for Wireless Mesh Network”, International Journal of Computer Applications, Volume. 42, No. 4, March 2012.
Murali. G, Sivaram Prasad. R, Bhaskar Rao .K.V, “Effective Key Authentication for ieee 802.11 Networks using Quantum Cryptography”, International Journal of Computer Applications, Volume. 46, No. 7, March 2012.
Noor Kareem Jumaa, “Implementation of Enhanced AKA in LTE Network”, International Journal of Computer Science and Mobile Computing, Volume. 4, Issue. 5, pg. 1124-1132, May 2015.
Rahul Aggarwal, Heeren Sharma, Deepak Gupta, “Analysis of Various attacks over BB84 Quantum key Distribution Protocol”, International Journal of Computer Applications, Volume. 20, No. 8, April 2011.
Sonali Nimbhorkar, Malik. L.G, “Prospective Utilization of Elliptic Curve Cryptography for Security Enhancement”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume. 2, Issue. 1, ISSN 2319-4847, January 2013.
Jeffrey D. Morris, Douglas D. Hodson, Michael R. Grimaila, David R. Jacques, Gerald Baumgartner, “Towards the Modeling and Simulation of Quantum Key Distribution Systems”, International Journal of Emerging Technology and Advanced Engineering, Volume. 4, Issue. 2, ISSN 2250-2459, February 2014.
Ahmed H.Hassanein, Ahmed A.Abdel Hafez, Abd EI-Hamid A. Gaafar, “New Authentication and Key Agreement Protocol for LTE-WLAN Interworking”, International Journal of Computer Application, Volume. 61, No .19, January 2013.
Anilmit Choudhary, Randhir Bhandari, “Analysis of UMTS (3G) Authentication and Key Agreement Protocol (AKA) for LTE (4G) Network”, International Journal on Recent and Innovation Trends in Computing and Communication, Volume. 3, Issue. 4, ISSN 2321-8169, Apirl 2015.
Stefan Rass, Sandra Konig, “Turning Quantum Cryptography against itself: How to avoid indirect eavesdropping in quantum networks by passive and active adversaries”, International Journal on Advance in Systems and Measurements, Volume. 5, Issue. 1, January 2012.
Ken Chen, Balasubramaniam (Bala) Natarajan, Steve Shattil, “Secret Key Generation Rate with Power Allocation in Relay-Based LTE-A Networks”, IEEE Transactions on Information Forensics and Security, Volume. 10, No. 1, November 2015.
Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, “Security v/s QoS for LTE Authentication and Key Agreement Protocol”, International Journal of Network Security & Its Applications, Volume. 4, No .5, September 2012.
Sravanthi Kanchi, Shubhrika Sandilya, Deesha Bhosale, Adwait Pitkar , Mayur Gonhalekar, “Overview of LTE-A Technology”, International Journal Of Scientific & Technology Research, Volume. 2, Issue. 11, November 2013.
Himanshu Tiwari, Amarkant Sharma, “Comparison of Wi-Max and LTE Network using MATLAB”, International Journal of Advanced Research in Computer Engineering & Technology, Volume. 4, Issue. 7, July 2015.
Mohamed .M.A, Abd-Eiatty .H.M, AboEI-Seoud .M.E.A, Rsalan W.M, “Performance Analysis of LTE-Advanced Physical Layer”, IJCSI International Journal of Computer Science Issues,Volume .11, Issue .1, January 2014.
Ying Loong Lee, Teong Chee Chuah, Jonathan, Alexey Vinel, “Recent Advances in Radio Resource Management For Heterogeneous LTE/LTE-A Networks”, IEEE Communications Surveys & Tutorials, Volume .16, No .4, 2014.
Jin Cao, Maode Ma, Hui Li, Yueyu Zhang, Zhenxing Luo, “A Survey on Security Aspects for LTE and LTE-A Networks”, IEEE Communications Surveys & Tutorials, Volume .16, No .1, 2014.
Hitesh Singh, Gupta .D.L, Singh A.K, “Quantum Key Distribution Protocols: A Review”, IOSR Journal of Computer Engineering (IOSR-JCE), Volume .16, Issue .2, e-ISSN: 2278-0661, Mar-Apr 2014.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.