Abstract
Recently, femtocell received a signification interest to improve the indoor coverage and provide better voice and data services. Lots of work has been done to improve the femtocell security, but still there are some issues which need to be addressed. Our contribution to the femtocell security is to protect secure zone (femtocell coverage area within macrocell) from unauthorized (non-CSG) users. In this paper, we propose a secure registration scheme for femtocell embedded network. In this scheme, only Closed Subscriber Group (CSG) users are allowed to access both the femtocell and macrocell services within the secure zone. By prioritizing the femtocell over macrocell within the secure zone, every user will try to camp on femtocell and invoke location registration to the femtocell as the user enters to the femtocell coverage area. If the user is within the allowed users list, the femtocell will allow the user otherwise femtocell will send a reject message to the user and also send the user information to the core network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Namgeol O, Han S, Kim H (2010) System capacity and coverage analysis of femtocell networks. In: WCNC, Sydney, pp 1–5
Chandrasekhar V, Andrews J, Gatherer A (2008) Femtocell networks: a survey. IEEE Commun Mag 46(9):59–67
Sang YJ, Hwang HG, Kim KS (2009) A self-organized femtocell for IEEE 802.16e system. In: GLOBECOM, pp 1–5
Chowdhury MZ, Trung BM, Jang YM (2011) Neighbor cell list optimization for femtocell-to-femtocell handover in dense femtocell networks. In: ICUFN, pp 241–245
Cao F, Fan Z (2010) The tradeoff between energy efficiency and system performance of femtocell deployment. ISWCS, UK, pp 315–319
Femtocell shipments flatline due to slow inventory burn rate. ABI research, Research report (2012)
Han C-K, Choi H-K, Kim I-H (2009) Building femtocell more secure with improved proxy signature. In: GLOBECOM, pp 1–6
Vanek T, Rohlik M (2011) Perspective security procedures for femtocell backbone. In: ICUMT, pp 1–4
Brassil J, Manadhata PK, (2012) Securing a femtocell-based location service. Mobile and wireless networking, pp 30–35
Zhang J, de la Roche G (2009) Femtocells: technologies and deployment
3GPP TS 25.304 (2009) User equipment (UE) procedures in idle mode and procedures for cell reselection in connected mode. 3GPP-TSG RAN, 8.5.0
3GPP TS 25.467 (2010) UTRAN architecture for 3G Home Node B (HNB). 3GPP-TSG RAN, 9.3.0
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht(Outside the USA)
About this paper
Cite this paper
Syed, I., Kim, H. (2013). A Secure Registration Scheme for Femtocell Embedded Networks. In: Park, J., Ng, JY., Jeong, HY., Waluyo, B. (eds) Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 240. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6738-6_13
Download citation
DOI: https://doi.org/10.1007/978-94-007-6738-6_13
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-6737-9
Online ISBN: 978-94-007-6738-6
eBook Packages: EngineeringEngineering (R0)