Figure 1 - uploaded by Cristina-Elena Vintilă
Content may be subject to copyright.
EPS 3G-4G architecture  

EPS 3G-4G architecture  

Source publication
Conference Paper
Full-text available
4G architecture is the latest 3GPP development when it comes to mobile networks design and optimization. Designed initially for data, but having a flexible architecture, 4G is capable of integrating IMS, this way bringing in voice and services. 3GPP wanted to facilitate the migration from 3G and non-3GPP solutions to the 4G design, therefore the co...

Similar publications

Article
Full-text available
4G systems have been continuously evolving to cope with the emerging challenges of human-centric and machine-to- machine (M2M) applications. Research has also now started on 5G systems. Scenarios have been proposed and initial requirements derived. 4G and beyond systems are expected to easily deliver a wide range of human-centric and M2M applicatio...
Article
Full-text available
Broadband internet access through the user equipment has become the hot research topic. The shadowing and multipath issues restrict the high performance nature of 4G cells. In Multi hop Relay (MHR) networks, Relay Stations (RS) are introduced to improve coverage and capacity of the system. There exist some issues like path selection and RSs deploym...
Conference Paper
Full-text available
Clinics and hospitals are acquiring more technological resources to help providing a faster and more precise diagnostic, with the goal of making it more dynamic and effective. This is pushing health institutions to search for more modern equipment, with greater technological features. Besides last generation equipment, another problem faced by thes...
Conference Paper
Full-text available
In this article, we present an alternative approach to enable Real Time Streaming Protocol (RTSP) based streaming services with Quality of Service (QoS) over 4th generation (4G) Long Term Evolution (LTE) mobile networks. Specifically, we present a proof-of-concept architecture that is more cost effective, easier and more simple to implement than ex...
Conference Paper
Full-text available
With the evolution of Telco systems towards 5G, new requirements emerge for delivering services. Network services are expected to be designed to allow greater flexibility. In order to cope with the new users' requirements, Telcos should rethink their complex and monolithic network architectures into more agile architectures. Adoption of NFV as well...

Citations

... Also, the protocol incurs the high computation overhead because of the public key cryptosystem. To overcome the above problems, Vintila et al. introduced the J-PAKE (Authenticated Key Exchange by Juggling) algorithm that maintains the KFS/KBS [18,30]. However, the scheme fails to preserve the privacy and suffers from the impersonation and DoS attack. ...
Article
Full-text available
In the mobile telecommunication network, Long term Evolution (LTE) is the most successful technological development for the industrial services and applications. The Evolved Packet System based Authentication and Key Agreement (EPS-AKA) was the first protocol proposed to authenticate the communication entities in the LTE network. But, the EPS-AKA protocol suffers from the single key exposure problem and is susceptible to various security attacks. Also, the protocol incurs high bandwidth consumption and computation overhead over the communication network. Moreover, the protocol doesn’t support the Internet of Things (IoT) based applications and has several security issues such as the privacy violation of the user identity and key set identifier (KSI). To resolve the above problems, various AKA protocols were proposed by the researchers. Unfortunately, none of the protocols succeeded to overcome the privacy preservation and single key exposure problem from the communication network. In this paper, we propose the performance and security enhanced (PSE-AKA) protocol for IoT enabled LTE/LTE-A network. The proposed protocol follows the cocktail therapy to generate the authentication vectors that improves the performance in terms of computation and communication overhead. The protocol preserves the privacy of objects, protects the KSI and avoids the identified attacks from the communication network. The formal verification and security analysis of the proposed protocol is carried out using the BAN logic and AVISPA tool respectively. The security analysis shows that the protocol achieves the security goals and secure against various known attacks. Finally, the performance analysis shows that the proposed protocol generates the less overhead and reduces the bandwidth consumption from the network.
Conference Paper
Full-text available
The security is an important issue in the mobile communications such as LTE/SAE systems, especially the mobile users' authentication and key production process which includes the most important risks. In this paper, we survey and compare authentication and key production solutions, namely the traditional solution EPS-AKA (Evolved Packet Switching — Authentication and key Agreement) which we consider as a benchmark solution and the J-PAKE (Password authenticated Key Exchange by Juggling) mechanism, included in the 4G networks by Cristina-Elena Vintila et al., which have many advantages such as off-line and on-line dictionary attacks resistance, forward secrecy and Known-key security, so that we can show the strengths and weakness of these solutions.