Skip to main content

Security in Emerging 4G Networks

  • Chapter
Next-Generation Wireless Technologies

Abstract

This chapter presents emerging wireless technologies applied to the domain of healthcare, which has been identified as a very important domain of increasing interest to researchers. The chapter also provides an overview of the security issues related to these emerging technologies and networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shokri, R., Theodorakopoulos, G., Le Boudec, J., & Hubaux, J. (2011). Quantifying location privacy. In IEEE symposium on security and privacy (SP), 2011 (pp. 247–262). New York: IEEE Press.

    Chapter  Google Scholar 

  2. 3rd Generation Partnership Project, 3GPP TR 33.821 V9.0.0 (2009-06), 3GPP Rationale and track of security decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution (SAE) (Release 9).

    Google Scholar 

  3. Mjølsnes, S., & Tsay, J. K. (2012). Computational security analysis of the UMTS and LTE authentication and key agreement protocols. arXiv:1203.3866.

  4. Nergiz, M. E., Atzori, M., & Saygin, Y. (2008). Towards trajectory anonymization: a generalization-based approach. In Proceedings of the SIGSPATIAL ACM GIS 2008 international workshop on security and privacy in GIS and LBS (pp. 52–61). New York: ACM.

    Chapter  Google Scholar 

  5. Sweeney, L. (2002). k-Anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570.

    Article  MathSciNet  MATH  Google Scholar 

  6. Terrovitis, M., & Mamoulis, N. (2008). Privacy preservation in the publication of trajectories. In 9th international conference on mobile data management, MDM’08 (pp. 65–72). New York: IEEE Press.

    Google Scholar 

  7. Truta, T. M., & Campan, A. (2007). K-anonymization incremental maintenance and optimization techniques. In Proceedings of the 2007 ACM symposium on applied computing (pp. 380–387). New York: ACM.

    Chapter  Google Scholar 

  8. Zhang, C., & Huang, Y. (2009). Cloaking locations for anonymous location based services: a hybrid approach. GeoInformatica, 13(2), 159–182.

    Article  Google Scholar 

  9. Zhang, X., Acıiçmez, O., & Seifert, J. P. (2007). A trusted mobile phone reference architecture via secure kernel. In Proceedings of the 2007 ACM workshop on scalable trusted computing (pp. 7–14). New York: ACM.

    Chapter  Google Scholar 

  10. Zheng, Y., He, D., Yu, W., & Tang, X. (2005). Trusted computing-based security architecture for 4G mobile networks. In Sixth international conference on parallel and distributed computing, applications and technologies, PDCAT 2005 (pp. 251–255). New York: IEEE Press.

    Google Scholar 

  11. Zheng, Y., He, D., Tang, X., & Wang, H. (2005). AKA and authorization scheme for 4G mobile networks based on trusted mobile platform. In Fifth international conference on information, communications and signal processing (pp. 976–980). New York: IEEE Press.

    Google Scholar 

  12. Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., & Tan, K. L. (2008). Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on management (pp. 121–132). New York: ACM.

    Chapter  Google Scholar 

  13. 3GPP TR 22.220 V11.6.0 (2012-09) 3rd Generation Partnership Project, 3GPP TR 22.220 V11.6.0 (2012-00), Service requirements for Home Node B (HNB) and Home eNode B (HeNB) (Release 11).

    Google Scholar 

  14. 3GPP TS 22.278 V8.4.0 (2007-12) 3rd Generation Partnership Project, 3GPP TS 22.278 V8.4.0 (2007-12), Service requirements for the Evolved Packet System (EPS) (Release 8).

    Google Scholar 

  15. 3rd Generation Partnership Project, 3GPP TS 33.401 V11.2.0 (2011-12), 3GPP System Architecture Evolution (SAE); Security architecture (Release 11).

    Google Scholar 

  16. 3rd Generation Partnership Project, 3GPP TS 23.003 V11.3.0 (2012-09), 3GPP Numbering, addressing and identification (Release 11).

    Google Scholar 

  17. 3rd Generation Partnership Project, 3GPP TS 33.102 V11.2.0 (2012-03), 3G Security, security architecture (Release 11).

    Google Scholar 

  18. Inamura, Y., Nakayama, T., & Takeshita, A. (2005). Trusted mobile platform technology for secure terminals. NTT DoCoMo Technical Journal, 7, 25–39.

    Google Scholar 

  19. Molina, J., Lee, H., Lee, S., & Song, Z. (2006). A mobile trusted platform module (MTPM) architecture. In Proc. of 2nd workshop on advances in trusted computing (WATC06).

    Google Scholar 

  20. DoCoMo, Trusted Mobile Platform Network (2004). Trusted Mobile Platform: Hardware Architecture Description Rev1. 0. Trusted Computing Group.

    Google Scholar 

  21. DoCoMo, Trusted Mobile Platform Network (2004). Trusted Mobile Platform: Software Architecture Description Rev1. 0. Trusted Computing Group.

    Google Scholar 

  22. DoCoMo, Trusted Mobile Platform Network (2004). Trusted Mobile Platform: Protocol Specification Document Rev1. 0. Trusted Computing Group.

    Google Scholar 

  23. Aiash, M., Mapp, G., & Lasebae, A. (2012). A survey on authentication and key agreement protocols in heterogeneous networks. International Journal of Network Security & Its Applications, 4(4), 199–214.

    Article  Google Scholar 

  24. Chaouchi, H., & Laurent-Maknavicius, M. (2009). Wireless and mobile network security. New York: ISTE/Wiley.

    Book  Google Scholar 

  25. Yahiya, T. A., & Chaouchi, H. (2010). On the integration of LTE and mobile WiMAX networks. In Proceedings of 19th international conference on computer communications and networks (ICCCN) (pp. 1–5). New York: IEEE Press.

    Google Scholar 

  26. Bilogrevic, I., Jadliwala, M., & Hubaux, J. P. (2010). Security issues in next generation mobile networks: LTE and femtocells. In 2nd international femtocell workshop, Luton, UK.

    Google Scholar 

  27. Freudiger, J., Shokri, R., & Hubaux, J. P. (2009). On the optimal placement of mix zones. In Privacy enhancing technologies (pp. 216–234). Berlin: Springer.

    Chapter  Google Scholar 

  28. Borgaonkar, R., Redon, K., & Seifert, J. P. (2011). Security analysis of a femtocell device. In Proceedings of the 4th international conference on security of information and networks (pp. 95–102). New York: ACM.

    Google Scholar 

  29. Zhang, Y., Zheng, J., & Hu, H. (Eds.) (2008). Security in wireless mesh networks. Boca Raton: Auerbach.

    Google Scholar 

  30. Eian, M., & Mjølsnes, S. F. (2011). The modeling and comparison of wireless network denial of service attacks. In Proceedings of the 3rd ACM SOSP workshop on networking, systems, and applications on mobile handhelds (p. 7). New York: ACM.

    Google Scholar 

  31. Gollakota, S., Ahmed, N., Zeldovich, N., & Katabi, D. (2011). Secure in-band wireless pairing. In USENIX security symposium.

    Google Scholar 

  32. Bocan, V., & Cretu, B. (2006). Threats and countermeasures in GSM networks. Journal of Networks, 1(6), 18–27.

    Article  Google Scholar 

  33. Forsberg, D., Horn, G., Moeller, W., & Niemi, V. (2010). LTE security. New York: Wiley.

    Book  Google Scholar 

  34. Shearer, J., & Gutmann, P. (1996). Government, cryptography, and the right to privacy. Journal of Universal Computer Science, 2(3), 113–146.

    Google Scholar 

  35. Location-based Service. http://en.wikipedia.org/wiki/Location-based_service.

  36. Steiniger, S., Neun, M., & Edwardes, A. (2006). Foundations of location based services. Lecture Notes on LBS, v. 1.0.

    Google Scholar 

  37. Quercia, D., Lathia, N., Calabrese, F., Di Lorenzo, G., & Crowcroft, J. (2010). Recommending social events from mobile phone location data. In IEEE 10th international conference on data mining (ICDM) (pp. 971–976). New York: IEEE Press.

    Google Scholar 

  38. Northstream White Paper, 2012, LTE and the 1800 MHz opportunity.

    Google Scholar 

  39. Infonetics: femtocell market set to double in 2012. http://lteworld.org/news/infonetics-femtocell-market-set-double-2012.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jacques Bou Abdo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Abdo, J.B., Chaouchi, H., Demerjian, J. (2013). Security in Emerging 4G Networks. In: Chilamkurti, N., Zeadally, S., Chaouchi, H. (eds) Next-Generation Wireless Technologies. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-5164-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5164-7_12

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5163-0

  • Online ISBN: 978-1-4471-5164-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics