This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
LTE/SAE Security Issues on 4G Wireless Networks
March-April 2013 (vol. 11 no. 2)
pp. 55-62
Anastasios N. Bikos, University of Patras
Nicolas Sklavos, Technological Educational Institute of Patras
The authors give an overview on the state of the art of potential security issues that occur in the deployment of the LTE/SAE (Long-Term Evolution/System Architecture Evolution) protocol in emerging 4G wireless technologies. Although security concerns and challenges in wireless networks will remain a hot topic in the future, the LTE/SAE standard could adapt to these rising challenges, becoming more robust and secure. By looking at the authentication and ciphering algorithms, such as EAP-AKA (Extensible Authentication Protocol for Authentication and Key Agreement), currently operating within the LTE protocol, the authors analyze several vulnerabilities in LTE/SAE security architecture—specifically, insecure AKA key derivation procedures and the lack of fast reauthentications during handovers.
Index Terms:
Authentication,Protocols,Algorithm design and analysis,Encryption,Computer security,Mobile communication,Long Term Evolution,Computer architecture,Extensible Authentication Protocol for Authentication and Key Agreement,4G wireless networks,LTE,LTE/SAE,standards,3GPP,3G,EAP-AKA,Long-Term Evolution/System Architecture Evolution,Long-Term Evolution
Citation:
Anastasios N. Bikos, Nicolas Sklavos, "LTE/SAE Security Issues on 4G Wireless Networks," IEEE Security & Privacy, vol. 11, no. 2, pp. 55-62, March-April 2013, doi:10.1109/MSP.2012.136
Usage of this product signifies your acceptance of the Terms of Use.