{"title":"LTE-R中X2切换协议密钥管理方案研究","authors":"Lihua Zhang, Jiayi Bai, Panpan Jiang","doi":"10.1109/ICCC47050.2019.9064161","DOIUrl":null,"url":null,"abstract":"LTE-R is one of the standards of the next generation railway mobile communication system. Its security has a vital impact on the successful deployment of the whole system. To overcome the shortcoming of only two hops forward security in X2 switching key management scheme, this paper proposes a one-hop secure X2 switching key management scheme, and makes a security analysis of the new scheme. The analysis shows that the proposed scheme has forward-hop security and can also resist desynchronization attacks. At the same time, the paper also compares the performance of the proposed scheme with the existing scheme. The analysis can be compared with the proposed scheme in terms of computational cost, but the security is higher.","PeriodicalId":6739,"journal":{"name":"2019 IEEE 5th International Conference on Computer and Communications (ICCC)","volume":"119 1","pages":"1479-1483"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Research on Key Management Scheme of X2 Handover Protocol in LTE-R\",\"authors\":\"Lihua Zhang, Jiayi Bai, Panpan Jiang\",\"doi\":\"10.1109/ICCC47050.2019.9064161\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"LTE-R is one of the standards of the next generation railway mobile communication system. Its security has a vital impact on the successful deployment of the whole system. To overcome the shortcoming of only two hops forward security in X2 switching key management scheme, this paper proposes a one-hop secure X2 switching key management scheme, and makes a security analysis of the new scheme. The analysis shows that the proposed scheme has forward-hop security and can also resist desynchronization attacks. At the same time, the paper also compares the performance of the proposed scheme with the existing scheme. The analysis can be compared with the proposed scheme in terms of computational cost, but the security is higher.\",\"PeriodicalId\":6739,\"journal\":{\"name\":\"2019 IEEE 5th International Conference on Computer and Communications (ICCC)\",\"volume\":\"119 1\",\"pages\":\"1479-1483\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 5th International Conference on Computer and Communications (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCC47050.2019.9064161\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 5th International Conference on Computer and Communications (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCC47050.2019.9064161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Key Management Scheme of X2 Handover Protocol in LTE-R
LTE-R is one of the standards of the next generation railway mobile communication system. Its security has a vital impact on the successful deployment of the whole system. To overcome the shortcoming of only two hops forward security in X2 switching key management scheme, this paper proposes a one-hop secure X2 switching key management scheme, and makes a security analysis of the new scheme. The analysis shows that the proposed scheme has forward-hop security and can also resist desynchronization attacks. At the same time, the paper also compares the performance of the proposed scheme with the existing scheme. The analysis can be compared with the proposed scheme in terms of computational cost, but the security is higher.