A Study on QoS and Security techniques of 4G Wireless Network

  IJCTT-book-cover
 
         
 
© 2020 by IJCTT Journal
Volume-68 Issue-11
Year of Publication : 2020
Authors : Amrutha K S, Gripsy Paul
DOI :  10.14445/22312803/IJCTT-V68I11P112

How to Cite?

Amrutha K S, Gripsy Paul, "A Study on QoS and Security techniques of 4G Wireless Network," International Journal of Computer Trends and Technology, vol. 68, no. 11, pp. 79-82, 2020. Crossref, 10.14445/22312803/IJCTT-V68I11P112

Abstract
Nowadays, mobile networks have become an essential part of our day-to-day life. Secure communication networks with desired QoS and high reliability must be assured while sharing information. Hence, scheming 4G networks that provide a secure service by managing constraints is a difficult task. This paper discusses a cognitive framework for increasing security and QoS, a privacy-preserving handover mechanism, Group Based Secure Authentication, and Key Agreement that decreases the authentication delay and prevention from malware attacks. Enhanced encryption method with AES algorithm for securing data transmission, distributed security architecture using The Elliptic Curve Diffie–Hellman (ECDH) protocol for authenticating the mobile nodes, a Secured Vertical Hand-off Decision (Sec-DVHD) scheme using Public Key Infrastructure (PKI) algorithm that ensures high throughput and a Secure Mesh Mode Protocol to enhance the security of 4G Networks.

Reference
[1] Rajani Muraleedharan and Lisa Ann Osadciw, Increasing QoS and Security in 4G Networks Using Cognitive Intelligence, Syracuse University, IEEE (2007).
[2] Hasen Nicanfar, Javad Hajipour, Farshid Agharebparast, Peyman TalebiFard, Victor C.M. Leung-Privacy-Preserving Handover Mechanism in 4G: 2013 IEEE Conference on Communication and Network Security.
[3] Jiming Yao, Tao Wang, Mingkai Chen, Lei Wang, Gejuan Chen- GBS-AKA: Group-based Secure Authentication and Key Agreement for M2M in 4G Network: International Conference on Cloud Computing Research and Innovations (2016).
[4] Vikas Kaul, Dr. V. A. Bharadi, P. Choudhari, Dhvani Shah, Dr. S. K. Narayankhedka- Security Enhancement for Data Transmission in 3G/4G Networks: International Conference on Computing Communication Control and Automation (2015).
[5] D.Niranjani, M. Ganaga Durga. Distributed Security Architecture for Authentication in 4G Networks: IEEE International Conference on Advances in Computer Applications (2016).
[6] Rami Tawil, Jacques Demarjie, Guy Pujolle. Secured Vertical Handoff Decision Scheme for the Fourth Generation (4G) Wireless Networks, Marie Curie University, Paris, France, IEEE (2008).
[7] Salwa Elramly, Saeed Ashry, Abdulatief Elkouny, Ahmed Elsherbini, and Hesham Elbadawy- SMSHM: Secure Mesh Mode Protocol To Enhance Security of 4G Networks, IEEE (2013).
[8] Gines Escudero-Andreu, Raphael C.-W. Phan and David J. Parish- Analysis and Design of Security for Next Generation 4G Cellular Networks, Loughborough University, PG Net (2012).
[9] Kaushal P. Makhecha, Kalpesh H. Wandra-4g Wireless Networks: Opportunities and Challenges, Saurashtra University. (2008).
[10] Yongsuk Park, Taejoon Park- A Survey of Security Threats on 4G Networks, Workshop on Security and Privacy in 4G Networks
[11] Hakima Chaouchi, Maryline Laurent-Maknavicius- Wireless and Mobile Network Security Security Basics, Security in On-the-shelf and Emerging Technologies.
[12] Payaswini P, Manjaiah D.H, Challenges and issues in 4G – Networks Mobility Management, International Journal of Computer Trends and Technology 4(5) (2013) 1247-1250.
[13] Ashish Kumar, Ankit Aswal, Lalit Singh- 4G Wireless Technology: A Brief Review.
[14] What is 4G? Everything about 4G Explained.[Online] Available: https://www.broadbandcompared.co.uk/guides/what-is-4g-everythingabout-4g-explained.
[15] How 4G Works [Online] Available: https://electronics.howstuffworks.com/4g.htm
[16] 4G. [Online] Available: https://en.wikipedia.org/wiki/4G

Keywords
QoS, cognitive framework, Handover, ECDH, Sec-DVHD