Mobile Networks and Management. 7th International Conference, MONAMI 2015, Santander, Spain, September 16-18, 2015, Revised Selected Papers

Research Article

Making HeNB More Secure with Improved Secure Access Protocol and Analyzing It

Download
398 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-26925-2_9,
        author={Fariba Ghasemi Najm and Ali Payandeh and Hashem Habibi},
        title={Making HeNB More Secure with Improved Secure Access Protocol and Analyzing It},
        proceedings={Mobile Networks and Management. 7th International Conference, MONAMI 2015, Santander, Spain, September 16-18, 2015, Revised Selected Papers},
        proceedings_a={MONAMI},
        year={2016},
        month={1},
        keywords={LTE HeNB Protocol Authentication Security IPSec},
        doi={10.1007/978-3-319-26925-2_9}
    }
    
  • Fariba Ghasemi Najm
    Ali Payandeh
    Hashem Habibi
    Year: 2016
    Making HeNB More Secure with Improved Secure Access Protocol and Analyzing It
    MONAMI
    Springer
    DOI: 10.1007/978-3-319-26925-2_9
Fariba Ghasemi Najm1,*, Ali Payandeh2, Hashem Habibi3
  • 1: Informatics Services Corporation (ISC)
  • 2: Malek Ashtar University of Technology (MUT)
  • 3: Sharif University of Technology
*Contact email: F_Ghasemi@ISC.CO.IR

Abstract

The 3rd Generation Partnership Project (3GPP) defined a new architecture, called Home eNode B (HeNB). HeNB is able to provide new services with higher data rate in a low cost. Security is a critical aspect of HeNB. In order to have HeNB secure access to core network, 3GPP defines an authentication protocol based on IKEv2. A number of security vulnerabilities such as HeNB masquerading have not been addressed and solved by 3GPP technical specification yet. In this paper an improved HeNB authentication protocol is introduced which does not allow an attacker to connect unauthorized network users using a mask. Finally, we evaluate our protocol performance and verify it by Automated Validation of Internet Security Protocols and Applications (AVISPA). Through our security analysis, we conclude that not only the proposed protocol prevents the various security threats but also it has no significant effect on authentication delay and cost.