A Robust and Flexible Authentication Model with Data Security ? A Review
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 135 , Downloads: 117 | CTR: 87 % | Weekly Popularity: ⮙2

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 8, August 2015

A Robust and Flexible Authentication Model with Data Security ? A Review

Nandini Aggarwal, Abhinav Bhandari

The 4G/LTE is the popular cellular model which is getting more popularity and adding more number of users every year. The networks with the higher number of users become the hot pick for the hacking attacks. 4G/LTE is having a higher probability of attracting the users because it also offers the higher bandwidth (data transmission speeds) for the 4G voice or data links, which make it highly prone to the channel hijacking attacks. The proposed model is aimed at solving the problem of voice security by using the periodic authentication between the two users or nodes connected to the 4G/LTE network. The voice call hacking is being popular as there are several call leaks are reported every year, where the calls of the government officials, military personnel, business men, highly priority officials in the bigwigs of the industry, etc have been tracked. To overcome such thing, the proposed model must be capable of security the voice call channel from any kind of the external or internal hacking attempts. The proposed model is empowered with the quick and secure key management model for the 4G/LTE voice model. The proposed model performance will be evaluated on the basis of energy consumption, throughput, data drop rate, etc.

Keywords: 4G security, key management, data privacy protection, confidentiality protection

Edition: Volume 4 Issue 8, August 2015

Pages: 626 - 629

Share this Article

How to Cite this Article?

Nandini Aggarwal, Abhinav Bhandari, "A Robust and Flexible Authentication Model with Data Security ? A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157406, Volume 4 Issue 8, August 2015, 626 - 629

135 PDF Views | 117 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'key management'

Views: 133 , Downloads: 100 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Views: 126 , Downloads: 100 | CTR: 79 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Views: 138 , Downloads: 102 | CTR: 74 % | Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2075 - 2077

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher, Sunita Nandagave

Share this Article

Views: 139 , Downloads: 103 | CTR: 74 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3273 - 3277

Homomorphic Encryption & A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing

Farhat Afshan, Shameem Akther

Share this Article

Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this Article

Similar Articles with Keyword 'data privacy protection'

Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Views: 124 , Downloads: 114 | CTR: 92 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1771 - 1776

A Secure Information Hiding Approach in Cloud Using LSB

Mudasir Ahmed Muttoo, Pooja Ahlawat

Share this Article

Views: 135 , Downloads: 117 | CTR: 87 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 626 - 629

A Robust and Flexible Authentication Model with Data Security ? A Review

Nandini Aggarwal, Abhinav Bhandari

Share this Article

Views: 125 , Downloads: 118 | CTR: 94 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 917 - 923

Trusted Third Party Framework for Data Security in Cloud Computing Environment

Ravuri. Venkata Bhargavi, K. Narayana Rao

Share this Article
Top