A Review Study on 4G Security

Authors

  • Sania Assistant Professor, Department of Computer Application, Tecnia Institute of Advanced Studies, Delhi, India Author
  • Pankaj Saraswat Assistant Professor, OEIT, Sanskriti University, Mathura, Uttar Pradesh, India Author
  • Swati Assistant Professor, OEIT, Sanskriti University, Mathura, Uttar Pradesh, India Author

Keywords:

Data Security, Internet, Long Term Evolution, Networks, Security, Wireless Network

Abstract

The introduction of the Long Term  Evolution (LTE) technology in recent technologies has  revolutionized Fourth Generation, 4G Network  communication, allowing users to receive high-speed data  up to 100 MHz. The problem of cyber-security has become  a menace to consumers all around the globe. This article  will go through the LTE security concept. The next  generations of wireless networks, known as 4G, will  completely replace 3rd generation networks. It will provide  faster speeds and multimedia services that are entirely IP based. 4G refers to an integrated, worldwide network that  will give customers with phone, data, and streaming  multimedia services "Anytime, Anywhere." The smooth  handoff, mobility management, security, and service across  multiple integrated networks are all essential and  demanding issues in 4G. Data security, hardware security,  and user privacy and integrity are the most important  security concerns for any wireless mobile device. Security  flaws may be created by attackers or induced by incorrect  device or network parameter settings. The paper explains  the concept of security and why it is important to pay  attention to it. This paper examines what 4G network  technology is and some of the proposed solutions in order  to fully understand the benefits and problems of  successfully deploying 4G. The future aspects are this  Network access security, which allows users to access the  service in a safe and secure manner. 

Downloads

Download data is not yet available.

References

S. K. Mohapatra, B. R. Swain, and P. Das, “Comprehensive Survey of Possible Security Issues on 4G Networks,” Int. J. Netw. Secur. Its Appl., 2015, doi: 10.5121/ijnsa.2015.7205.

A. N. Bikos and N. Sklavos, “LTE/SAE security issues on 4G wireless networks,” IEEE Security and Privacy. 2013, doi: 10.1109/MSP.2012.136.

R. M. Zaki and H. Bahjat Abdul wahab, “4G Network Security Algorithms: Overview,” Int. J. Interact. Mob. Technol., 2021, doi: 10.3991/ijim.v15i16.24175.

A. Singla, S. R. Hussain, O. Chowdhury, E. Bertino, and N. Li, “Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks,” Proc. Priv. Enhancing Technol., 2020, doi: 10.2478/popets-2020-0008.

A. Deshpande and D. S. Pawar, “Evolution of Wireless Technology,” Int. J. Comput. Sci. Mob. Comput. IJCSMC., 2020.

M. Meraj, I. Mir, and S. Kumar, “Evolution of Mobile Wireless Technology from 0G to 5G,” Int. J. Comput. Sci.

Inf. Technol. , 2015.

M. A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, and H. Janicke, “Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes,” Journal of Network and Computer Applications. 2018, doi: 10.1016/j.jnca.2017.10.017.

S. Farhan, M. Ali, M. Kamran, Q. Javaid, and S. Zhang, “A Survey on Security for Smartphone Device,” Int. J. Adv. Comput. Sci. Appl., 2016, doi: 10.14569/ijacsa.2016.070426.

M. A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, and H. Janicke, “Security for 4G and 5G Cellular Networks,” J. Netw. Comput. Appl., 2018.

S. R. Hussain, O. Chowdhury, S. Mehnaz, and E. Bertino, “LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE,” 2018, doi: 10.14722/ndss.2018.23313.

D. Candal-Ventureira, P. Fondo-Ferreiro, F. Gil-Castiñeira, and F. J. González-Castaño, “Quarantining malicious iot devices in intelligent sliced mobile networks,” Sensors (Switzerland), 2020, doi: 10.3390/s20185054.

Downloads

Published

2021-05-30

How to Cite

A Review Study on 4G Security . (2021). International Journal of Innovative Research in Computer Science & Technology, 9(3), 173–178. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/11537