Search In this Thesis
   Search In this Thesis  
العنوان
Secure and Efficient Techniques for Authentication and Identification for 4G Mobile Communications \
المؤلف
Elsakka, Ahmed Hussein Hassan Massoud.
هيئة الاعداد
باحث / احمد حسين حسن مسعود السقا
ahmedelsaka25@yahoo.com
مشرف / حسن ندير خير الله
مشرف / شوقى السيد محمد شعبان
shawki.shaabam@yahoo.com
مشرف / كريم حسن السيد حسن موسى
مناقش / محمد السعيد نصر
مناقش / هشام محمد طلبه
htolbs@hotmail.com
الموضوع
Electrical Engineering.
تاريخ النشر
2022.
عدد الصفحات
111 p. :
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/12/2022
مكان الإجازة
جامعة الاسكندريه - كلية الهندسة - الهندسة الكهربائية
الفهرس
Only 14 pages are availabe for public view

from 134

from 134

Abstract

Today, there is no doubt that wireless communication systems dominated our world according to daily operations such as money transfer and military communication applications that can accomplish by using different wireless communication systems. Therefore, it is necessary to meet the requirements of transmission quality that represent in providing high data rates and minimum bit error rate. Also, ensuring the quality of service that appears in the system security and latency. It is essential for any wireless communication system especially the mobile communication to utilize an acceptable error detection and correction channel code to minimize the bit error rate that led to enhanced system performance. Polar code is a new channel coding scheme for approaching Shannon’s capacity and enhancing system reliability because of their polarized channel construction concept. Also, mobile communication needs to ensure security, confidentiality, and privacy among the users and their network by using a dynamic authentication protocol which is the first step to building a secure mobile system. This thesis demonstrated the performance of polar codes over discrete memory less channels such as binary symmetric channel, binary erasure channel, and additive white Gaussian noise channel at varied rates and layouts to determine the optimal parameters for these channels. The statistical study demonstrated that when the design parameter for every channel is optimized to calculate the initial value for polarizing the physical channel, the system bit error rate declines which led to enhanced system performance. The polar code is a unique coding approach that can be used to offer a comprehensive secured scheme by combining polar coding with Mersenne-Twister pseudorandom number generator (MT-PRNG) to achieve a super-secured encoding operation. The pre-shared crypto-system cyphering key initiates the starting state of the MT-PRNG as a seed. The randomly generated sequences govern the values of the frozen bits in polarized bit channels and their associated indices. A half-bit-error-rate probability system performance is calculated when the encoding ciphering keys at the receiver differ by a single bit from those utilized at the transmitter Using calculated numerical analysis, the system is shown to be secure against brute force attacks, Rao-Nam attacks, and polar code reconstruction attacks. The authentication process for mobile communication generations is the most important operation to access and gain the services of the mobile operators to protect the user’s daily aspect. This thesis presented a Double Evolved Packet System Authentication and Key Agreement (DEPS-AKA) Protocol to overcome the exposures of the Long-Term Evolution EPS-AKA process and saves the authentication mechanism from various attacks. The proposed techniques utilized Elliptic Curve Diffie Hellman Key Exchange (ECDHKE) between the user equipment and mobile management entity to secure the international mobile subscriber identity and user network capability. The proposed DEPS-AKA has been tested and checked using the widely accepted automated validation of Internet Security Protocol (AVISPA). The simulation analysis showed that it consumed a computation time equal to 0.06 S with 246 visited nodes and 0.11 S for search time. It also proved to be immune against passive and active attacks such as DOS and reply attacks. To enforce the confidentiality between mobile users and their networks. This thesis presents a group Security Authentication and Key Agreement Protocol Built by Elliptic Curve Diffie Hellman Key Exchange (GSAKA-ECDHKE) to overcome and address the LTE networks EPS-AKA protocol flaws and vulnerabilities. GSAKA-ECDHKE is presented for 4G mobile military group communications to provide security, confidentiality, and privacy while the users and networks authenticate. By embedding the group Commander role in the EPS-AKA protocol to control the member authentication in the group. GSAKA-ECDHKE protocol is based on ECDHKE and hash function to generate and share secret Elliptic Curve key to encrypt and protect the routing authentication parameters. AVISPA tool is used for security analysis and formal verification. AVISPA demonstrated that GSAKA-ECDHKE had overcome various known security attacks such as Man In The Middle (MITM), replay attacks, and Denial of Services (DoS) attacks, satisfying the evaluated security requirements. Additionally, the suggested protocol provides the lowest communication overheads compared to the existing group-based AKA protocols.