Security Extension for Relaxed Trust Requirement in Non3GPP Access to the EPS

نویسندگان

  • Hiten Choudhury
  • Basav Roychoudhury
  • Dilip Kr. Saikia
چکیده

Third Generation Partnership Project (3GPP) has standardized the Evolved Packet System (EPS) as a part of their Long Term Evolution System Architecture Evolution (LTE/SAE) initiative. In order to provide ubiquitous services to the subscribers and to facilitate interoperability, EPS supports multiple access technologies where both 3GPP and Non-3GPP defined access networks are allowed to connect to a common All-IP core network called the Evolved Packet Core (EPC). However, a factor that continues to limit this endeavor is the trust requirement with respect to the subscriber’s identity privacy. There are occasions during Non-3GPP access to the EPS when intermediary network elements like the access networks that may even belong to third party operators have to be confided with the subscriber’s permanent identity. In this paper, we propose a security extension that relaxes this need. Contrary to several other solutions proposed recently in this area, our solution can be adopted as an extension to the existing security mechanism.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

Fighting Hunger Together: A Case of Women Farmers’ Participation in Women Groups in Mwala Division, Kenya

Food security remains a major challenge for most rural households in Kenya especially those in arid and semi arid areas. Women play a crucial role as primary food producers and custodians of household food security. They however face many constraints in their endeavor to secure food for their households. Women, lack access to extension education, land and credit and these challenges are exacerb...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Jrpit 39.4.qxp

This paper examines factors which lead to the failure of electronic payment systems (EPS). In order to understand these factors a single case study of a failed Australian EPS was conducted. The findings confirm the influence of EPS adoption factors identified from the literature, which include cooperation with established entities, simplicity, trust, security and mutuality of stakeholder benefi...

متن کامل

Analysis of Factors Influencing Food Security Status of Female Headed Farm Households in Abia State, Nigeria

This study analysed factors influencing food security status of female headed farm households in Abia state, Nigeria. Multistage random sampling technique was employed in selecting 240 female headed farm households from whom data were collected using structured questionnaire. Data collected were analyzed using descriptive statistics, food security indices and probit regression technique. Result...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2016