Downloads: 121 | Views: 310 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers | Computer Science & Engineering | India | Volume 4 Issue 8, August 2015 | Popularity: 6.5 / 10
A Robust and Flexible Authentication Model with Data Security ? A Review
Nandini Aggarwal, Abhinav Bhandari
Abstract: The 4G/LTE is the popular cellular model which is getting more popularity and adding more number of users every year. The networks with the higher number of users become the hot pick for the hacking attacks.4G/LTE is having a higher probability of attracting the users because it also offers the higher bandwidth (data transmission speeds) for the 4G voice or data links, which make it highly prone to the channel hijacking attacks. The proposed model is aimed at solving the problem of voice security by using the periodic authentication between the two users or nodes connected to the 4G/LTE network. The voice call hacking is being popular as there are several call leaks are reported every year, where the calls of the government officials, military personnel, business men, highly priority officials in the bigwigs of the industry, etc have been tracked. To overcome such thing, the proposed model must be capable of security the voice call channel from any kind of the external or internal hacking attempts. The proposed model is empowered with the quick and secure key management model for the 4G/LTE voice model. The proposed model performance will be evaluated on the basis of energy consumption, throughput, data drop rate, etc.
Keywords: 4G security, key management, data privacy protection, confidentiality protection
Edition: Volume 4 Issue 8, August 2015
Pages: 626 - 629
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 306 - 309A Basic Framework for Policy Updates for the Outsourced Exchange of Private Medical Records
V. Jayaganesh
Downloads: 5 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024
Pages: 1755 - 1759Enhancement in Homomorphic Encryption Scheme of Cloud Computing to Isolate DOS Attack
Jaspreet Kaur, Dr. Gurjit Singh Bhathal
Downloads: 101
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Downloads: 103
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2075 - 2077Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN
Rekha V. Aher, Sunita Nandagave
Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1728 - 1731Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V