scholarly journals 4G Network Security Algorithms: Overview

Author(s):  
Rana M. Zaki ◽  
Hala Bahjat Abdul wahab

<p class="0abstractCxSpFirst">Long Term Evolution (LTE) of (Universal Mobile Telecommunication System) is one of the modern steps in series of mobile telecommunications systems. That appears to be a strong technology that meets the requirements of fourth-generation (4G) mobile networks and supports authentication and encryption mechanisms between User Equipment (UE) and Message Management Entity (MME). This paper provides an overview of the three most important algorithms that are considered the heart of LTE cryptographic algorithms (SNOW3G, AES, and ZUC) and a comparison between cipher key length and initial vector length to generate keystream depending on the structure used for each algorithm as each algorithm has a time of complexity and space of complexity that differs from the other security algorithm.</p><p class="0abstractCxSpLast"><strong> </strong></p>

2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Ricardo Marco Alaez ◽  
Jose M. Alcaraz Calero ◽  
Qi Wang ◽  
Fatna Belqasmi ◽  
May El Barachi ◽  
...  

Fourth-Generation (4G) mobile networks are based on Long-Term Evolution (LTE) technologies and are being deployed worldwide, while research on further evolution towards the Fifth Generation (5G) has been recently initiated. 5G will be featured with advanced network infrastructure sharing capabilities among different operators. Therefore, an open-source implementation of 4G/5G networks with this capability is crucial to enable early research in this area. The main contribution of this paper is the design and implementation of such a 4G/5G open-source testbed to investigate multioperator infrastructure sharing capabilities executed in virtual architectures. The proposed design and implementation enable the virtualization and sharing of some of the components of the LTE architecture. A testbed has been implemented and validated with intensive empirical experiments conducted to validate the suitability of virtualizing LTE components in virtual infrastructures (i.e., infrastructures with multitenancy sharing capabilities). The impact of the proposed technologies can lead to significant saving of both capital and operational costs for mobile telecommunication operators.


A Heterogeneous Vehicular Network (HetVNET) is a promising network system that integrates several network protocols or systems e.g. IEEE802.11p, Short Range Communication, Third/Fourth Generation mobile networks etc. In HetVNET, wireless fidelity access points (Wi-Fi APs) must utilized by automobile end users to stabilise the Long-Term Evolution (LTE) 4G networks by way of offloading. No matter how usage of the opportunistic Wi-Fi APs to offload the LTE networks in a HetVNET system is comparatively more straightforward. This circumstances is due to the less area reached by Wi-Fi access points and weak placement strategies of access points. Many researcher have suggested that offloading schemes based on the historical wireless fidelity connection patterns noticed by an interest vehicle (IV) in making an offloading conclusion. However, based only on the historical connection patterns affects the prediction accuracy and offloading ratio of most existing schemes even when access point placement data is obtainable. This work suggested that the Opportunistic Offloading Scheme (OOS) is based on historical connection patterns and vehicular trajectory computation to predict the next accessible access point. The suggested plan is decentralised and focuses on urban scenarios whereby the likelihood of an IVto come into contact with Wi-Fi access points is high. We detect the complexity of the suggested Opportunistic Offloading Scheme in this work. The result shows that Opportunistic Offloading Scheme is linear dependent on the amount of the processed data accessible for the prediction.


2022 ◽  
Vol 13 (1) ◽  
pp. 187-196
Author(s):  
Ukoette Jeremiah Ekah ◽  
Chibuzo Emeruwa

It is common knowledge that the transition of mobile networks from one generation to another is basically for the improvement in the network’s Quality of Service (QoS). Bearing this in mind, we will assumme that the Universal Mobile Telecommunication System (UMTS) will outperform the Global System for Mobile Communication (GSM), hence, the motivation to conduct this study in Calabar, Nigeria, for four mobile networks; MTN, Airtel, Globacom and 9mobile. With the aid of a TEMS investigation software installed in a laptop, a measurement campaign was carried out and log files collected, with focus on Call Setup Success Rate (CSSR), Dropped Call Rate (DCR), Handover Success Rate (HOSR), Call Setup Time (CST), network coverage and network quality. The collected data was analyzed with the aid of a TEMS discovery software. The analyzed data for each Key Performance Indicator (KPI) was compared with the minimum benchmark of the telecommunications regulatory body, the Nigerian Communication Commission (NCC). Result reveal that there was no outright improvement in the QoS and there was fluctuation in the QoS provided by the network operators. We therefore conclude that the network operators, either did not make accurate planning before installing their base stations or do not optimize their networks frequently and this led to poor QoS in most cases.


Author(s):  
Omid Namvar Gharehshiran ◽  
Alireza Attar ◽  
Vikram Krishnamurthy

This chapter investigates resource allocation in a Universal Mobile Telecommunication System (UMTS) Long Term Evolution (LTE) network. Users form coalitions, each exploiting resources in a particular femto-cell, while occupying optimal resources in the sense that total network throughput is maximized. Users in each cell collaborate to increase network throughput and simultaneously attempt to increase their own payoffs subject to a fairness criterion. Payoffs to the users are defined as the monetary equivalent of the individual users’ achievable throughput in the specified coalition structure. A distributed game-theoretic resource allocation mechanism is studied whereby users autonomously decide which sub-channel in which coalition to join. It is proved that if each user operates according to the proposed algorithm, the sum throughput of all links converges almost surely to its maximum feasible value.


Author(s):  
Qusay Jalil Kadhim ◽  
Ali M. Alsahlany ◽  
Ahmed Hassan Hadi

Many researchers have discussed various topics in universal mobile telecommunication system (UMTS) networks: the process of switching from one cell to another for the subscriber and the impact of the quality of the connection during the transition process, quality of services (QoS), the quality of the uplink and downlink carrier line, the various types of code for the voice transmitted through the Internet, especially the research that discussed voice over internet protocol (VoIP) technology as voice travels from cell to cell in mobile networks, depending on the type of delivery. In this paper, a proposed scenario of a UMTS network was implemented to evaluate the multicellular VoIP movement; the proposed UMTS network was simulated using the OPNET 14.5 simulator. The calculation and analysis of the different parameters of the user while moving from one cell to another with different movement speeds considered, the best mean opinion score (MOS) value (3.19) registered for the scenario (soft handover) comparing with another type of handover (3.00).


Author(s):  
Christos Xenakis

This chapter analyzes the security architecture designed for the protection of the universal mobile telecommunication system (UMTS). This architecture is built on the security principles of second generation (2G) systems with improvements and enhancements in certain points in order to provide advanced security services. The main objective of the third generation (3G) security architecture is to ensure that all information generated by or relating to a user, as well as the resources and services provided by the serving network and the home environment are adequately protected against misuse or misappropriation. Based on the carried analysis the critical points of the 3G security architecture, which might cause network and service vulnerability are identified. In addition, the current research on the UMTS security and the proposed enhancements that aim at improving the UMTS security architecture are briefly presented and analyzed.


2016 ◽  
Vol 78 (5-7) ◽  
Author(s):  
Azita Laily Yusof ◽  
Ahmad Fathi Abdul Rahim ◽  
Mohd Saufi Haji Nasro Ali ◽  
Norsuzila Ya’acob ◽  
Aiman Zainali ◽  
...  

 Nowadays, the cellular communication evolution had shown that the demand for two-way voice communication had decreased against data rate demand after the globalization of Internet usage. This is where the cellular systems took another phase of evolution with Long Term Evolution (LTE) known as the fourth generation of cellular systems. LTE network is a system of packet switched network where the architecture had been simplified from the previous Universal Mobile Telecommunication System (UMTS) which is known as the third generation of cellular system. By having a simpler architecture than previous generation technology, the LTE standard has high data performance in wireless mobility. In measuring the performance of the LTE coverage, a lot of cost had been spent for the radio frequency optimization where the activity had been for the unwanted location where the poor coverage area is not applicable. This study is expected to optimize the data collection methodologies in mobile measurement in which could also be the turnkey of the current Telecommunications industry in benchmarking, new site implementation, solving customer complaints, and other related data collection services. The aim of this study is to develop an advanced measurement of LTE coverage by applying a sheet of electrical conductive material with two different sizes under the measurement device, and to determine the effectiveness of the proposed method. To determine the effective method in mobile measurement, the measured value of the conventional measurement will be compared with the proposed method together with the theoretical value of the measurement.


2015 ◽  
Vol 781 ◽  
pp. 3-6
Author(s):  
Sophonwit Somchai ◽  
Jirun Potinakkha ◽  
Nararat Ruangchaijatupon ◽  
V. Prasertchareonsuk ◽  
M. Leeprakobboon ◽  
...  

This paper shows the feasibility analysis of the 4th generation (4G) telecommunication system on 800-900 MHz spectrum. It applies the Long-Term Evolution (LTE) wireless communication and makes a feasibility design of cell site placement. An academic community is selected as a studied site because the high usage of advanced communication technologies. Due to the variety of population density, age, and gender, Khon Kaen University is chosen. This paper also suggests the model for cell site installation and cell site positions in Khon Kaen University area.


Sign in / Sign up

Export Citation Format

Share Document