By Topic

A green and secure authentication for the 4th generation mobile network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Lili Gu ; Sch. of Electr. & Comput. Eng., RMIT Univ., Melbourne, VIC, Australia ; Gregory, M.A.

The 4th generation (4G) mobile access network and the core network are evolving towards a secure, fast, and Internet Protocol-based network. With the emergence of next generation battery-powered smart mobile phone and open source application platforms, security and the terminal's energy consumption have become big issues. Long Term Evolution (LTE) is one of the most popular 4G technologies defined by 3rd Generation Partnership Projects (3GPP). It is observed that the end user requires two authentication steps to access multimedia services. The first is the LTE network layer authentication, and the second is the IP Multimedia Subsystem (IMS) service layer authentication. The authentication steps utilize energy and are carried out using the Authentication and Key Agreement (AKA) protocol. This paper proposes an Improved AKA (I-AKA) authentication protocol which authenticates the user on both the network layer and the service layer without double execution the AKA protocol and simplifies the authentication steps. Furthermore, the security and energy consumption were analyzed and the results showed the proposed I-AKA could save up to 81.82% of the terminal's energy consumption related to authentication with increased security.

Published in:

Australasian Telecommunication Networks and Applications Conference (ATNAC), 2011

Date of Conference:

9-11 Nov. 2011