Skip to main content

Security Analysis and Improvement of Femtocell Access Control

  • Conference paper
Network and System Security (NSS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8792))

Included in the following conference series:

  • 2145 Accesses

Abstract

Recently, femtocell solutions have been attracting increasing attention since coverage for broadband radios can effectively eliminate wireless notspots. Typically, a femtocell is designed for use in a home or small business. In 2009, 3GPP (3rd Generation Partnership Program) announced and published the first femtocell standard. In this paper, we first point out that the user equipment (UE) registration procedure, which defined in 3GPP standard, is vulnerable to the denial-of-service (DoS) attack. Then, we propose a mechanism to defend against this attack. For compatibility, the proposed mechanism utilizes the well-defined control message in the 3GPP standard, and modifies the UE registration procedure as little as possible.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. WiMAX Forum: Femtocells core specification: DRAFT-T33-118-R016v01-B (May 2010)

    Google Scholar 

  2. 3GPP: TR-25.820-v8.2.0: 3G Home NodeB Study Item Technical Report (Release 8) (September 2008)

    Google Scholar 

  3. Chen, C.M., Chen, Y.H., Lin, Y.H., Sun, H.M.: Eliminating rouge femtocells based on distance bounding protocol and geographic information. Expert Systems with Applications 41(2), 426–433 (2014)

    Article  MathSciNet  Google Scholar 

  4. 3GPP: TS-25.467-v9.3.0: UTRAN artitechture for 3G Home Node B (HNB) Stage 2 (Release 9) (June 2010)

    Google Scholar 

  5. Wu, M.E., Tso, R., Sun, H.M.: On the improvement of fermat factorization using a continued fraction technique. Future Generation Computer Systems 30, 162–168 (2014)

    Article  Google Scholar 

  6. Sun, H.M., Wu, M.E., Ting, W.C., Hinek, M.J.: Dual rsa and its security analysis. IEEE Transactions on Information Theory 53(8), 2922–2933 (2007)

    Article  MathSciNet  Google Scholar 

  7. Wu, T.Y., Tsai, T.T., Tseng, Y.M.: Efficient searchable id-based encryption with a designated server. Annals of Telecommunications-Annales des Télécommunications, 1–12 (2013)

    Google Scholar 

  8. Wu, M.E., Chen, C.M., Lin, Y.H., Sun, H.M.: On the improvement of wiener attack on rsa with small private exponent. The Scientific World Journal 2014 (2014)

    Google Scholar 

  9. Tso, R.: A new way to generate a ring: Universal ring signature. Computers & Mathematics with Applications 65(9), 1350–1359 (2013)

    Article  MathSciNet  Google Scholar 

  10. Wang, E.K., Ye, Y., Xu, X.: Location-based distributed group key agreement scheme for vehicular ad hoc network. International Journal of Distributed Sensor Networks 2014 (2014)

    Google Scholar 

  11. Tso, R., Huang, X., Susilo, W.: Strongly secure certificateless short signatures. Journal of Systems and Software 85(6), 1409–1417 (2012)

    Article  Google Scholar 

  12. Chen, C.M., Wang, K.H., Wu, T.Y., Pan, J.S., Sun, H.M.: A scalable transitive human-verifiable authentication protocol for mobile devices. IEEE Transactions on Information Forensics and Security 8(8), 1318–1330 (2013)

    Article  Google Scholar 

  13. Chen, C.M., Lin, Y.H., Chen, Y.H., Sun, H.M.: Sashimi: secure aggregation via successively hierarchical inspecting of message integrity on wsn. Journal of Information Hiding and Multimedia Signal Processing 4(1), 57–72 (2013)

    Article  Google Scholar 

  14. Ku, W.C., Chen, C.M., Lee, H.L.: Cryptanalysis of a variant of peyravian-zunic’s password authentication scheme. IEICE Transactions on Communications 86(5), 1682–1684 (2003)

    Google Scholar 

  15. Kim, R., Kwak, J., Etemad, K.: WiMAX femtocell: requirements, challenges, and solutions. IEEE Communications Magazine 47(9), 84–91 (2009)

    Article  Google Scholar 

  16. Golaup, A., Mustapha, M., Patanapongpibul, L.: Femtocell access control strategy in UMTS and LTE. IEEE Communications Magazine 47(9), 117–123 (2009)

    Article  Google Scholar 

  17. 3GPP: TS-22.220-v9.3.0: Service requirements for Home NodeBs and Home eNodeBs (Release 9) (December 2009)

    Google Scholar 

  18. Chang, C.C., Wu, C.C., Lin, L.C.: 3gpp sim-based authentication schemes for wireless local area networks. International Journal of Innovative Computing Information and Control (IJICIC) 6(2), 461–474 (2010)

    Google Scholar 

  19. picoChip Designs Ltd.: PC203 Femtocell Multi-core DSP (2010), http://www.picochip.com/page/70/Multi-core-PC203

  20. Intel Corporation: Intel IXP465 Network Processor, http://www.intel.com/design/network/products/npfamily/ixp465.htm

  21. IEEE: Air Interface for Fixed Broadband Wireless Access Systems, Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands (February 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Chen, CM., Wu, TY., Tso, R., Wu, ME. (2014). Security Analysis and Improvement of Femtocell Access Control. In: Au, M.H., Carminati, B., Kuo, CC.J. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science, vol 8792. Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11698-3_17

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11697-6

  • Online ISBN: 978-3-319-11698-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics