SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
DOI : 10.5121/ijnsa.2015.7205 61
COMPREHENSIVE SURVEY OF POSSIBLE
SECURITY ISSUES ON 4G NETWORKS
Sumant Ku Mohapatra1
, BiswaRanjan Swain1
and Pravanjan Das1
Department of Electronics & Telecommunication Engineering, Trident Academy of
Technology, Bhubaneswar,Odisha, India
Ericson Global private limited, Kolkata, India
ABSTRACT:
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a
number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and
their design decisions. Second, the security of 4G architecture with next generation network security and 8-
security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed.
Finally, we proposed four layer security model which manages to ensure more secure packets transmission
by taking all the necessary security measures.
KEYWORDS
Network security, Security architecture, 4G, 3GPP, WiMAX, Threats
1.INTRODUCTION
The recent advances in wireless network technologies and the rising applications as web 2-0,
mobile TV and streaming content led to the standardization of the 3rd generation partnership
project (3GPP). The next generation wireless communication systems world wide standardized as
4G which has increased security and very much reliable communication. In terms of architectural
design 4G is more interoperability across the HetNet environments and also it is operate on the
TCP/IP architectural design procedure[3].When 3rd generation communication is moving to the
4th generation communication, many organizations are repairing for their 4G such as
IEEE802.16m, International Telecommunication union (ITU), Vodafone, China mobile
communications and many next generation mobile network vendors like Motorola and
Samsung[2]. Now a days many definitions of 4G arises which provides a bandwidth of 1000
Mbps in mobile equipment and in normal 1Gbps. It is surrounding with heterogeneous networks
having number of Radio Access Technology and Radio Access network[1]. The enabling
technologies which is interconnected for 4G are orthogonal frequency division multiplexing,
vertical handover protocols and in advance multiple input and multiple output and cognitive radio
network are also included. Table 1 shows main threads and risk and design decisions of 4G is
given below.
International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
62
Table-1-4G Main threats and risk and their design decisions
This paper studies different security issues and challenges in 4G technologies in section 3. The
Remainder of this paper is organized as follows. Section 2 discuss 4G network technology
architecture[7].Section 4 proposed a four layer security model which manages to ensure more
secure packet transmission by taking all the necessary security measures such as taking the form
of intrusion detection systems, Firewalls and IPsec and manipulating network resources in an
intelligent manner using sophisticated authentication protocols.
2. 4G NETWORK ARCHITECTURE
The 4G network architecture is combination of multiple heterogeneous networks such as WiMAX
and 3G[8]. Among the multiple access networks, anyone can used by the service subscriber and
also it provides services from the same service unit like the IP Multimedia subsystems. Figure 1
shows aIMT-advanced 4G network system specified in ITU.
International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
63
Figure 1: IMT-advanced 4G network system specified in ITU
The Wimax architecture has an access serving network to provide the service stations or mobile
stations which is a connection to network service provider. But the 3GPP LTE architecture has
two core networks such as GPRS and EPC network. The GPRS core network offer network
connections for existing RANs and Evolved packet core network to give network connections to
evolved RAN and 3 GPP IP Access.
2.1 IP Multimedia subsystem security architecture
The IMS (IP Multimedia subsystems) is an important overlay on top of the network infrastructure
like 3 GPP. It aims to protect the all IMS sessions in between the end-users and IMS servers. It
also offering it’s authentication and authorization mechanisms. There are two parts of IMS
security and are described below.
• First-hop Security: It secures the first hop from the end-user to the proxy-call session
control function.
• Network domain security: It protects the rest of hops between call session control
functions inside IME core.
2.2 Next Generation network security architecture
The next generation network security mostly secures the IMS security. It divided in to two
security domains.
International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
64
• Access view security: it secures the first hop for the end-user device to access the
network.
• Core view security: It covers security within intra operated domain.
2.3 8-Security dimensions of 4G Network
The 8-security dimensions take care to measures implemented to counter threats and potential
attacks.
Figure 2: 8-Security dimension analysis
• Access control which measures protection level against unauthorized use of network
resources.
• Authentication which measures confirmation level for the identities of each entity using
the network.
• Non-repudiation which prove the origin of the data or identifies the cause of an event or
action.
• Data confidentiality is to ensure that data is not disclosed to unauthorized users.
• Communication security is to allow information to flow only between authorized end
points.
• Data integrity is to ensure the accuracy of data so it can be modified, deleted, created or
replicated without authorization and also provides an indication of unauthorized attempts
to change the data.
• Availability is to ensure that there is no denial of authorized access to network elements,
stored information, Information flows, services and applications due to network-
impacting events.
International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
65
• Privacy is to provide for the protection of information that could be derived from the
observation of network activities.
3. 4G WIRELESS SECURITY ISSUES
3.1 Physical layer issues
Both WIMAX and LTE are subject to two key vulnerabilities at the physical layer. By
deliberately inserting man-made interference on to a medium, a communication system can stop
functioning due to a high signal-to-noise ratio. There are two types of interference that can be
carried out: (i) noise (ii) multicarrier. Noise interference can be performed using white Gaussian
noise (WGN). In the case of Multi-carrier interference, the attacker identifies carriers used by the
system and injects a very narrowband signal on to those carriers[4]. Interference attacks can be
easily carried out as the equipment and knowledge to carry out such attacks are widely available.
Our analysis indicates that interference is easy to detect using radio spectrum monitoring
equipments. Using radio-direction-finding tools, the interfering source can be traced[1]. In
addition, increasing the power of the source signal and using spreading techniques can increase
it’s resilience against interference. While the possibility of interference is significant, since it is
easy to detect and address, we believe it’s impact on the WIMAX/LTE network and users will be
limited[13].
3.2 WiMAX-MAC-Layer security issues
To establish initial access with base station then IEEE802.16[11] Radio interface standard
describes several steps in order for a mobile station, that includes seven steps.The steps are initial
ranging and time synchronization, upper level parameter acquisition, basic capabiliiities
negotiation, scanning and synchronization, mobile station authorization and key exchange,
registration with the serving base station and the last step by which connection established.
Among these steps five step involved non secure traffic and two other two steps involved secure
traffic exchange based on the device authentication standards of Wi-max[6].
3.3 Denial of service security issues
The DoSattack are a concern for Wi-max network. These attack can be initiated through simple
flooding attacking on authenticated management frames[2].
3.4 Wi-Fi security issues
Wireless LANs based on WI-FI technology have been available for more than a decade.
However, the WI-Fi technology has most often been used in homes and public places such as
airports, hostels, and shopping malls where security is seeming less critical, although the cost
benefits of Wi-Fi could be attractive to enterprise environments thanks to increased mobility,
lower operational costs, and flexibility. Accordingly, security researchers have focused on
security threats and solutions in Wi-Fi networks to make it applicable to the enterprise
International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
66
environments. The original security mechanism of Wi-Fi called wired equivalent privacy (WEP),
had a number of security flaws arising from the mis-application of cryptography, e.g. the use
of RC4 stream cipher and CRC-32 authentication[3]. Regarding this, a comprehensive security
evaluation based on the ITU-T X.805 standard has been performed[9].To remedy the security
flaws of Wi-Fi, several solutions have been proposed. The Robust Security Network (RSN) for
the IEEE 802.Ix standard’s port based network access control is a layer-2 authentication
mechanism and specifies how EAP can be encapsulated in the Ethernet frames. RSA Laboratory
and Cisco have developed TKIP to mitigate the weakness of RC4 via frequent renewal of
encryption key[5].
3.5. Possible Threats on 4G
The 4G may face lot of possible security Risks. The various heterogeneous technologies access
the infrastructure, so potential security needed to secure technologies . Also it may collapse of the
entire network infrastructure when multiple service providers share the core network
infrastructure. In 4G wireless , end-user equipments can also become a source of malicious
attacks worms, viruses, calls and spam mails and so on. The spam over internet, the new spam for
VoIP results a serious problem like the today’s E-mail spam[2]. As like the above VoIP threats
other 3 more VoIP Threats are (1) spoofing that misdirects communications, modifies data, or
transfers cash from a stolen credit card number. (2) Standard input point registration hijacking
that substitutes the IP address of packet header with attacker’s own. (3)Dropping of private
conversation that intercepts and CRYPT arises IP packets.
4. PROPOSED 4G FOUR LAYER SECURITY MODEL
The proposed 4 layer security model integrated into the two frameworks, peripheral and core
which allows to explore new security concepts. In this model 3 separate security layers such as
network architecture security, network transport security and service and application security are
used. It is designed to provide coherent heterogeneous communication on a global scale and it
also provide continuous connectivity through the seem less operation of multiple mobile
networks. These are accessible by mobile nodes, providing features like cognitive radio and
vertical handover.
International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
67
Peripheral network
Core network
Figure 3-Proposed four layer security model which is integrated in to the two frameworks
In this proposed model two frame works are used.
• Peripheral frame work which runs on the mobile node and interacts with wireless
access networks.
• Core framework which runs in a distributed fashion in the core infrastructure.
By this double organized frame work, a multi layer security system arises that interacts with
those two frameworks to provide a secure environment.
International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
68
5. CONCLUSION
To better understand the security of 4G network we represent their different security accepts like
physical layer issues, WiMAX-MAC layer issues, QoS issues and 4G Wi-Fi security issue. This
study also discussed 8-security dimension of 4G network and represent possible threats on 4G.
By the proposed four layer security model we try to avoid unsecureness of next generation
wireless communication.
REFERENCES
[1] N. Borisov, I. Goldberg, and D. Wagner, “Intercepting Mobile Communications: The Insecurity of
802.11,” Proceedings of ACM MobiCom’2001, Rome, Italy, July 2001.
[2] T. Park, H. Wang, M. Cho, and K. G. Shin, “Enhanced Wired Equivalent Privacy for IEEE 802.11
Wireless LANs,” CSE-TR-469-02,University of Michigan, November 2002, available from
http://www.eecs.umich.edu/techreports/cse/02/CSE-TR-469-02.pdf.
[3] Bell Labs, “The Bell Labs Security Framework: Making the Case for End-to-End Wi-Fi Security,”
2006.
[4] IEEE Draft 802.1x/D1, “Port Based Network Access Control,” available from
http://www.ieee802.org/1/mirror/8021/docs99/PortNACIEEE.pdf.
[5] I.S. Comsa et al., “Reinforcement Learning Based Radio Resource Scheduling in LTE-Advanced,”
Proc. 17th Int’l Conf. Automation and Computing (ICAC 11), IEEE, 2011,pp. 219–224.
[6] J. Berkmann et al., “On 3G LTE Terminal Implementation—Algorithms,ComplexitiesAnd
Challenges,” Proc. Int’l Wireless Communications andMobile Computing Conf. (IWCMC 08), IEEE,
2008; doi:10.1109/IWCMC.2008.168
[7] Z. Shi et al., “Layered Security Approach in LTE and Sim-ulation,” Proc. 3rd Int’l Conf.Anti-
counterfeiting, Security,and Identification in Communication (ASID 09),
IEEE,2009;doi:10.1109/ICASID.2009.5276930.
[8] C. Vintila, V. Patriciu, and I. Bica, “Security Analysis of LTE Access Network,” Proc.10th Int’l Conf.
Networks (ICN 11), Int’l Academy, Research, and Industry Assoc.,2011, pp. 29– 34.
[9] Network Architecture, tech. specification 3GPP TS 23.002 V9.1.0, 3GPP, 2009.
[10] D. Forsberg, LTE Security, John Wiley, 2013.
[11] H. Mun, K.Han, and K. Kim, “3G-WLAN Interwork-ing: Security Analysis and New Authentication
and Key Agreement Based on EAP-AKA,” Wireless Telecommunications Symp.(WTS 2009), IEEE,
2009; doi:10.1109/ WTS.2009.5068983.
[12] N. Seddigh et al., “Security Advances and Challenges in 4G Wireless Networks,” Proc..8th Conf.
Privacy Security and Trust (PST 10), 2010,IEEE; doi:10.1109/PST.2010.5593244
[13] L. Huang et al., “Performance of Authentication Protocols in LTE Environments,”;Proc.Int’l Conf.
Compu-tational Intelligence and Security (CIS 09), IEEE, 2009. doi:10.1109/CIS.2009.50
[14] L. Hui and B. Shuo, “Research and Implementation of LTE NAS Security,” Proc. Int’l .
doi:10.1109/ICEIT.2010.5607551
[15] 3G Security: Security Threats and Requirements, tech. specification TS 21.133, 3GPP,2001. Conf.
Educational and Information Technology (ICEIT 10), IEEE, 2010;
International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
69
Authors
Sumant Ku Mohapatra is working as Assistant Professor in Trident Academy of
Technology, Bhubaneswar affiliated to B.P.U.T, Odisha, India. His research interests
include wireless communication, digital signal processing, image processing and optical
fiber communication
BiswaRanjan Swain is working as Assistant Professor in Trident Academy of
Technology; Bhubaneswar affiliated to B.P.U.T, Odisha, India. His areas of research
interests are in satellite & wireless communication, digital image processing and optical
fiber communication .
Pravanjan Das worked in Trident Academy of Technology, B.P.U.T, Bhubaneswar,
Odisha, India as an Assistant Professor. His research interest is in wireless communication.
Now he is working in Ericsson India Global Services Pvt. Ltd, Kolkata, India

More Related Content

What's hot

Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless securitySarath K Sukumar
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262MKEERTHIKA1
 
Secured Intrusion Protection System through EAACK in MANETS
Secured Intrusion Protection System through EAACK in MANETSSecured Intrusion Protection System through EAACK in MANETS
Secured Intrusion Protection System through EAACK in MANETSijtsrd
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security systemIJAEMSJORNAL
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyClayton Hatathlie
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Underwriters Laboratories
 
A Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentA Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentAM Publications,India
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMIJNSA Journal
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackRashi Dhagat
 

What's hot (19)

Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
B010331019
B010331019B010331019
B010331019
 
10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262
 
Secured Intrusion Protection System through EAACK in MANETS
Secured Intrusion Protection System through EAACK in MANETSSecured Intrusion Protection System through EAACK in MANETS
Secured Intrusion Protection System through EAACK in MANETS
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
 
Network security
Network securityNetwork security
Network security
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
 
Telecom Security
Telecom SecurityTelecom Security
Telecom Security
 
A Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentA Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile Environment
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 

Similar to 7215nsa05

A Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksA Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksScott Bou
 
Security_for_5G_Mobile_Wireless_Networks (1).pdf
Security_for_5G_Mobile_Wireless_Networks (1).pdfSecurity_for_5G_Mobile_Wireless_Networks (1).pdf
Security_for_5G_Mobile_Wireless_Networks (1).pdf4nm18is123SunidhiSir
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecurityIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfSecurityGen1
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenSecurityGen1
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceSecurityGen1
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksIJNSA Journal
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IJNSA Journal
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
 
A REVIEW PAPER ON 5G NETWORK.pdf
A REVIEW PAPER ON 5G NETWORK.pdfA REVIEW PAPER ON 5G NETWORK.pdf
A REVIEW PAPER ON 5G NETWORK.pdfAddison Coleman
 
Network Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityNetwork Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityslametarrokhim1
 

Similar to 7215nsa05 (20)

1Table of Contents.docx
1Table of Contents.docx1Table of Contents.docx
1Table of Contents.docx
 
A Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksA Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless Networks
 
Security_for_5G_Mobile_Wireless_Networks (1).pdf
Security_for_5G_Mobile_Wireless_Networks (1).pdfSecurity_for_5G_Mobile_Wireless_Networks (1).pdf
Security_for_5G_Mobile_Wireless_Networks (1).pdf
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
 
A REVIEW PAPER ON 5G NETWORK.pdf
A REVIEW PAPER ON 5G NETWORK.pdfA REVIEW PAPER ON 5G NETWORK.pdf
A REVIEW PAPER ON 5G NETWORK.pdf
 
Network Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityNetwork Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided security
 

Recently uploaded

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 

Recently uploaded (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

7215nsa05

  • 1. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015 DOI : 10.5121/ijnsa.2015.7205 61 COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS Sumant Ku Mohapatra1 , BiswaRanjan Swain1 and Pravanjan Das1 Department of Electronics & Telecommunication Engineering, Trident Academy of Technology, Bhubaneswar,Odisha, India Ericson Global private limited, Kolkata, India ABSTRACT: This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8- security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures. KEYWORDS Network security, Security architecture, 4G, 3GPP, WiMAX, Threats 1.INTRODUCTION The recent advances in wireless network technologies and the rising applications as web 2-0, mobile TV and streaming content led to the standardization of the 3rd generation partnership project (3GPP). The next generation wireless communication systems world wide standardized as 4G which has increased security and very much reliable communication. In terms of architectural design 4G is more interoperability across the HetNet environments and also it is operate on the TCP/IP architectural design procedure[3].When 3rd generation communication is moving to the 4th generation communication, many organizations are repairing for their 4G such as IEEE802.16m, International Telecommunication union (ITU), Vodafone, China mobile communications and many next generation mobile network vendors like Motorola and Samsung[2]. Now a days many definitions of 4G arises which provides a bandwidth of 1000 Mbps in mobile equipment and in normal 1Gbps. It is surrounding with heterogeneous networks having number of Radio Access Technology and Radio Access network[1]. The enabling technologies which is interconnected for 4G are orthogonal frequency division multiplexing, vertical handover protocols and in advance multiple input and multiple output and cognitive radio network are also included. Table 1 shows main threads and risk and design decisions of 4G is given below.
  • 2. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015 62 Table-1-4G Main threats and risk and their design decisions This paper studies different security issues and challenges in 4G technologies in section 3. The Remainder of this paper is organized as follows. Section 2 discuss 4G network technology architecture[7].Section 4 proposed a four layer security model which manages to ensure more secure packet transmission by taking all the necessary security measures such as taking the form of intrusion detection systems, Firewalls and IPsec and manipulating network resources in an intelligent manner using sophisticated authentication protocols. 2. 4G NETWORK ARCHITECTURE The 4G network architecture is combination of multiple heterogeneous networks such as WiMAX and 3G[8]. Among the multiple access networks, anyone can used by the service subscriber and also it provides services from the same service unit like the IP Multimedia subsystems. Figure 1 shows aIMT-advanced 4G network system specified in ITU.
  • 3. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015 63 Figure 1: IMT-advanced 4G network system specified in ITU The Wimax architecture has an access serving network to provide the service stations or mobile stations which is a connection to network service provider. But the 3GPP LTE architecture has two core networks such as GPRS and EPC network. The GPRS core network offer network connections for existing RANs and Evolved packet core network to give network connections to evolved RAN and 3 GPP IP Access. 2.1 IP Multimedia subsystem security architecture The IMS (IP Multimedia subsystems) is an important overlay on top of the network infrastructure like 3 GPP. It aims to protect the all IMS sessions in between the end-users and IMS servers. It also offering it’s authentication and authorization mechanisms. There are two parts of IMS security and are described below. • First-hop Security: It secures the first hop from the end-user to the proxy-call session control function. • Network domain security: It protects the rest of hops between call session control functions inside IME core. 2.2 Next Generation network security architecture The next generation network security mostly secures the IMS security. It divided in to two security domains.
  • 4. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015 64 • Access view security: it secures the first hop for the end-user device to access the network. • Core view security: It covers security within intra operated domain. 2.3 8-Security dimensions of 4G Network The 8-security dimensions take care to measures implemented to counter threats and potential attacks. Figure 2: 8-Security dimension analysis • Access control which measures protection level against unauthorized use of network resources. • Authentication which measures confirmation level for the identities of each entity using the network. • Non-repudiation which prove the origin of the data or identifies the cause of an event or action. • Data confidentiality is to ensure that data is not disclosed to unauthorized users. • Communication security is to allow information to flow only between authorized end points. • Data integrity is to ensure the accuracy of data so it can be modified, deleted, created or replicated without authorization and also provides an indication of unauthorized attempts to change the data. • Availability is to ensure that there is no denial of authorized access to network elements, stored information, Information flows, services and applications due to network- impacting events.
  • 5. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015 65 • Privacy is to provide for the protection of information that could be derived from the observation of network activities. 3. 4G WIRELESS SECURITY ISSUES 3.1 Physical layer issues Both WIMAX and LTE are subject to two key vulnerabilities at the physical layer. By deliberately inserting man-made interference on to a medium, a communication system can stop functioning due to a high signal-to-noise ratio. There are two types of interference that can be carried out: (i) noise (ii) multicarrier. Noise interference can be performed using white Gaussian noise (WGN). In the case of Multi-carrier interference, the attacker identifies carriers used by the system and injects a very narrowband signal on to those carriers[4]. Interference attacks can be easily carried out as the equipment and knowledge to carry out such attacks are widely available. Our analysis indicates that interference is easy to detect using radio spectrum monitoring equipments. Using radio-direction-finding tools, the interfering source can be traced[1]. In addition, increasing the power of the source signal and using spreading techniques can increase it’s resilience against interference. While the possibility of interference is significant, since it is easy to detect and address, we believe it’s impact on the WIMAX/LTE network and users will be limited[13]. 3.2 WiMAX-MAC-Layer security issues To establish initial access with base station then IEEE802.16[11] Radio interface standard describes several steps in order for a mobile station, that includes seven steps.The steps are initial ranging and time synchronization, upper level parameter acquisition, basic capabiliiities negotiation, scanning and synchronization, mobile station authorization and key exchange, registration with the serving base station and the last step by which connection established. Among these steps five step involved non secure traffic and two other two steps involved secure traffic exchange based on the device authentication standards of Wi-max[6]. 3.3 Denial of service security issues The DoSattack are a concern for Wi-max network. These attack can be initiated through simple flooding attacking on authenticated management frames[2]. 3.4 Wi-Fi security issues Wireless LANs based on WI-FI technology have been available for more than a decade. However, the WI-Fi technology has most often been used in homes and public places such as airports, hostels, and shopping malls where security is seeming less critical, although the cost benefits of Wi-Fi could be attractive to enterprise environments thanks to increased mobility, lower operational costs, and flexibility. Accordingly, security researchers have focused on security threats and solutions in Wi-Fi networks to make it applicable to the enterprise
  • 6. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015 66 environments. The original security mechanism of Wi-Fi called wired equivalent privacy (WEP), had a number of security flaws arising from the mis-application of cryptography, e.g. the use of RC4 stream cipher and CRC-32 authentication[3]. Regarding this, a comprehensive security evaluation based on the ITU-T X.805 standard has been performed[9].To remedy the security flaws of Wi-Fi, several solutions have been proposed. The Robust Security Network (RSN) for the IEEE 802.Ix standard’s port based network access control is a layer-2 authentication mechanism and specifies how EAP can be encapsulated in the Ethernet frames. RSA Laboratory and Cisco have developed TKIP to mitigate the weakness of RC4 via frequent renewal of encryption key[5]. 3.5. Possible Threats on 4G The 4G may face lot of possible security Risks. The various heterogeneous technologies access the infrastructure, so potential security needed to secure technologies . Also it may collapse of the entire network infrastructure when multiple service providers share the core network infrastructure. In 4G wireless , end-user equipments can also become a source of malicious attacks worms, viruses, calls and spam mails and so on. The spam over internet, the new spam for VoIP results a serious problem like the today’s E-mail spam[2]. As like the above VoIP threats other 3 more VoIP Threats are (1) spoofing that misdirects communications, modifies data, or transfers cash from a stolen credit card number. (2) Standard input point registration hijacking that substitutes the IP address of packet header with attacker’s own. (3)Dropping of private conversation that intercepts and CRYPT arises IP packets. 4. PROPOSED 4G FOUR LAYER SECURITY MODEL The proposed 4 layer security model integrated into the two frameworks, peripheral and core which allows to explore new security concepts. In this model 3 separate security layers such as network architecture security, network transport security and service and application security are used. It is designed to provide coherent heterogeneous communication on a global scale and it also provide continuous connectivity through the seem less operation of multiple mobile networks. These are accessible by mobile nodes, providing features like cognitive radio and vertical handover.
  • 7. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015 67 Peripheral network Core network Figure 3-Proposed four layer security model which is integrated in to the two frameworks In this proposed model two frame works are used. • Peripheral frame work which runs on the mobile node and interacts with wireless access networks. • Core framework which runs in a distributed fashion in the core infrastructure. By this double organized frame work, a multi layer security system arises that interacts with those two frameworks to provide a secure environment.
  • 8. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015 68 5. CONCLUSION To better understand the security of 4G network we represent their different security accepts like physical layer issues, WiMAX-MAC layer issues, QoS issues and 4G Wi-Fi security issue. This study also discussed 8-security dimension of 4G network and represent possible threats on 4G. By the proposed four layer security model we try to avoid unsecureness of next generation wireless communication. REFERENCES [1] N. Borisov, I. Goldberg, and D. Wagner, “Intercepting Mobile Communications: The Insecurity of 802.11,” Proceedings of ACM MobiCom’2001, Rome, Italy, July 2001. [2] T. Park, H. Wang, M. Cho, and K. G. Shin, “Enhanced Wired Equivalent Privacy for IEEE 802.11 Wireless LANs,” CSE-TR-469-02,University of Michigan, November 2002, available from http://www.eecs.umich.edu/techreports/cse/02/CSE-TR-469-02.pdf. [3] Bell Labs, “The Bell Labs Security Framework: Making the Case for End-to-End Wi-Fi Security,” 2006. [4] IEEE Draft 802.1x/D1, “Port Based Network Access Control,” available from http://www.ieee802.org/1/mirror/8021/docs99/PortNACIEEE.pdf. [5] I.S. Comsa et al., “Reinforcement Learning Based Radio Resource Scheduling in LTE-Advanced,” Proc. 17th Int’l Conf. Automation and Computing (ICAC 11), IEEE, 2011,pp. 219–224. [6] J. Berkmann et al., “On 3G LTE Terminal Implementation—Algorithms,ComplexitiesAnd Challenges,” Proc. Int’l Wireless Communications andMobile Computing Conf. (IWCMC 08), IEEE, 2008; doi:10.1109/IWCMC.2008.168 [7] Z. Shi et al., “Layered Security Approach in LTE and Sim-ulation,” Proc. 3rd Int’l Conf.Anti- counterfeiting, Security,and Identification in Communication (ASID 09), IEEE,2009;doi:10.1109/ICASID.2009.5276930. [8] C. Vintila, V. Patriciu, and I. Bica, “Security Analysis of LTE Access Network,” Proc.10th Int’l Conf. Networks (ICN 11), Int’l Academy, Research, and Industry Assoc.,2011, pp. 29– 34. [9] Network Architecture, tech. specification 3GPP TS 23.002 V9.1.0, 3GPP, 2009. [10] D. Forsberg, LTE Security, John Wiley, 2013. [11] H. Mun, K.Han, and K. Kim, “3G-WLAN Interwork-ing: Security Analysis and New Authentication and Key Agreement Based on EAP-AKA,” Wireless Telecommunications Symp.(WTS 2009), IEEE, 2009; doi:10.1109/ WTS.2009.5068983. [12] N. Seddigh et al., “Security Advances and Challenges in 4G Wireless Networks,” Proc..8th Conf. Privacy Security and Trust (PST 10), 2010,IEEE; doi:10.1109/PST.2010.5593244 [13] L. Huang et al., “Performance of Authentication Protocols in LTE Environments,”;Proc.Int’l Conf. Compu-tational Intelligence and Security (CIS 09), IEEE, 2009. doi:10.1109/CIS.2009.50 [14] L. Hui and B. Shuo, “Research and Implementation of LTE NAS Security,” Proc. Int’l . doi:10.1109/ICEIT.2010.5607551 [15] 3G Security: Security Threats and Requirements, tech. specification TS 21.133, 3GPP,2001. Conf. Educational and Information Technology (ICEIT 10), IEEE, 2010;
  • 9. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015 69 Authors Sumant Ku Mohapatra is working as Assistant Professor in Trident Academy of Technology, Bhubaneswar affiliated to B.P.U.T, Odisha, India. His research interests include wireless communication, digital signal processing, image processing and optical fiber communication BiswaRanjan Swain is working as Assistant Professor in Trident Academy of Technology; Bhubaneswar affiliated to B.P.U.T, Odisha, India. His areas of research interests are in satellite & wireless communication, digital image processing and optical fiber communication . Pravanjan Das worked in Trident Academy of Technology, B.P.U.T, Bhubaneswar, Odisha, India as an Assistant Professor. His research interest is in wireless communication. Now he is working in Ericsson India Global Services Pvt. Ltd, Kolkata, India