S. El-Ramly, S. Ashry, A. Elkouny, A. Elsherbini, H. Elbadawy
{"title":"SMSHM: Secure Mesh Mode Protocol,增强4G网络的安全性","authors":"S. El-Ramly, S. Ashry, A. Elkouny, A. Elsherbini, H. Elbadawy","doi":"10.1109/ICITCS.2013.6717884","DOIUrl":null,"url":null,"abstract":"In order to protect the user's privacy as well as the network used, security support is mandatory for any communication. Unilateral authentication between the subscriber and Base Station (BS) was one of IEEE 802.16 security leaks. According to IEEE 802.16e, some security flaws are resolved, while there is scarcities of research on Mesh topology security as some vulnerability are still present. This paper points out a number of security holes and proposes a novel protocol intended to enhance security in Mesh mode. The protocol is based on biocryptosystems providing solutions to secure initial network entry, and achieve privacy between two different nodes in the network. Additionally, the protocol used the integration of Advance Encryption Standard and Biometric Digital Key (AES-BDK) to secure further network messages and key distribution.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"600 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"SMSHM: Secure Mesh Mode Protocol to Enhance Security of 4G Networks\",\"authors\":\"S. El-Ramly, S. Ashry, A. Elkouny, A. Elsherbini, H. Elbadawy\",\"doi\":\"10.1109/ICITCS.2013.6717884\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to protect the user's privacy as well as the network used, security support is mandatory for any communication. Unilateral authentication between the subscriber and Base Station (BS) was one of IEEE 802.16 security leaks. According to IEEE 802.16e, some security flaws are resolved, while there is scarcities of research on Mesh topology security as some vulnerability are still present. This paper points out a number of security holes and proposes a novel protocol intended to enhance security in Mesh mode. The protocol is based on biocryptosystems providing solutions to secure initial network entry, and achieve privacy between two different nodes in the network. Additionally, the protocol used the integration of Advance Encryption Standard and Biometric Digital Key (AES-BDK) to secure further network messages and key distribution.\",\"PeriodicalId\":420227,\"journal\":{\"name\":\"2013 International Conference on IT Convergence and Security (ICITCS)\",\"volume\":\"600 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on IT Convergence and Security (ICITCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITCS.2013.6717884\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on IT Convergence and Security (ICITCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITCS.2013.6717884","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SMSHM: Secure Mesh Mode Protocol to Enhance Security of 4G Networks
In order to protect the user's privacy as well as the network used, security support is mandatory for any communication. Unilateral authentication between the subscriber and Base Station (BS) was one of IEEE 802.16 security leaks. According to IEEE 802.16e, some security flaws are resolved, while there is scarcities of research on Mesh topology security as some vulnerability are still present. This paper points out a number of security holes and proposes a novel protocol intended to enhance security in Mesh mode. The protocol is based on biocryptosystems providing solutions to secure initial network entry, and achieve privacy between two different nodes in the network. Additionally, the protocol used the integration of Advance Encryption Standard and Biometric Digital Key (AES-BDK) to secure further network messages and key distribution.