원문정보
초록
영어
In this paper, we propose a formally verified protocol to securely manage vertical handovers heterogeneous networks (HetNets), even when different cryptographic algorithms are used in the infrastructure. The protocol presentation goes with a review of the current propositions of security mechanisms and procedures dedicated to manage vertical handovers. From a critical analysis, the HetNets are positioned in the context of wireless security to describe the possible attacks that afflict this new kind of infrastructure. From this analysis, it is revealed that the different entities involved in the management of handovers are surrounded by new security challenges. This challenges and the positioning of HetNets helps to deliver a new suited protection. Securing vertical handovers means to deal with the different cryptographic algorithms from the security architecture of the different technologies that protect the sessions of communications.
목차
1: Introduction
2: The HetNet Architecture and Denitions
3: Existing Security Standards for Mobile Networks and related works
3.1: 2G, 3G, and 4G mobile networks
3.2: WiFi and WiMax data networks
3.3: Decision Algorithms for Vertical Handovers
3.4: Related Works Specific to Handover Security
4: Analysis of the New Challenges and Attacks in HetNets
4.1: Attacks from a malicious node
4.2: Attacks from a corrupted point of access
4.3: Attacks from a malicious node cooperating with a point of access
4.4: Protocols
4.5: Flaw diffusion, cryptographic primitives
5: Meta-Model for the Security Analysis of LTE HetNets
5.1: Functional security requirements:
6: New protocol proposal
6.1: Assumptions
6.2: Description
7: Security Analysis of the new protocol
7.1: Security scenarios
7.2: Formal verification with Proverif
8: Performances
9: Conclusions
Acronyms
References
Appendix: ProVerif specication of the main subprotocol
