References
- Liu Qi, Shi Yameng ,Li Fuchang and Fan Bin, "Research on Services Modeling in LTE Networks," China Communications, vol. 13, no. 2, pp. 109-120, February 2016. https://doi.org/10.1109/CC.2016.7833465
- Cao Jin, Ma Maode and Li Hui, "Unified handover authentication between heterogeneous access systems in LTE networks," in Proc. of the IEEE Global Communications Conference, pp.5308-5313, December 3-7, 2012.
- Yaseein Soubhi Hussein, Borhanuddin M Ali, Mohd Fadlee A. Rasid and Aduwati Sali, "Handover in LTE networks with proactive multiple preparation approach and adaptive parameters using fuzzy logic control," KSII transactions on internet and information systems, vol. 9, no. 7, pp. 2389-2413, July, 2015. https://doi.org/10.3837/tiis.2015.07.004
- Amitava Ghost, Rapeepat Ratasuk and Bishwarup Mondal, "MONDAL B, et al. LTE-advanced: Next-generation wireless broadband technology," IEEE wireless communications, vol. 17, no. 3, pp. 10-22, June 2010. https://doi.org/10.1109/MWC.2010.5490974
- Chan-kyu Han and Hyoung-Kee Choi, "Security analysis of handover key management in 4G LTE/SAE networks," IEEE Transactions on Mobile Computing, vol. 13, no. 2, pp. 457-468, February, 2014. https://doi.org/10.1109/TMC.2012.242
- Cao Jin, Ma Maode, Li Hui, Zhang Yueyu and Luo Zhengxing, "A survey on security aspects for LTE and LTE-A networks," IEEE communications surveys& tutorials, vol. 16, no. 1, pp. 283-302, First quarter, 2014. https://doi.org/10.1109/SURV.2013.041513.00174
- Cao Jin, Li Hui, Ma Maode, Zhang Yueyu and Lai Chengzhe, "A simple and robust handover authentication between HeNB and eNB in LTE networks," Computer Networks, vol. 56, no. 8, pp. 2119-2131, May, 2012. https://doi.org/10.1016/j.comnet.2012.02.012
- Li Taicheng, He Li and Wu Bin, "Key refresh during cell handover in LTE featuring one-Hop forward security," Computer Systems & Applications, vol. 20, no. 8, pp. 67-71, August, 2011.
- Xiao Qinshu, Zhou Wenan, Cui Baojiang and Li Lingrong, "An Enhancement for key management in LTE/SAE X2 handover based on ciphering key parameters," in Proc. of the 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp.256-261, November 8-10, 2014.
- Eman F. ElGaml, Hussein ElAttar and Hesham M. ElBadawy, "Evaluation of Intrusion Prevention Technique in LTE Based Network," International Journal of Scientific & Engineering Research, vol. 5, issue.12, pp.1395-1400, December 2014.
- Dan Forsberg, "LTE key management analysis with session keys context," Computer Communications, vol. 33, no. 16, pp. 1907-1915, July 2010. https://doi.org/10.1016/j.comcom.2010.07.002
- Naim Qachri, Olivier Markowitch and Jean-Michel Dricot, "A Formally Verified Protocol for Secure Vertical Handovers in 4G Heterogeneous Networks," International Journal of Security and Its Applications, vol.7, no.6, pp.309-326, July,2013. https://doi.org/10.14257/ijsia.2013.7.6.32
- 3GPP, Evolved universal terrestrial radio access network(EUTRAN), architecture description, 3GPP TS 36.401 v9.2.0, 2010.
- Chang Junren, Li Yajuan, Feng Shulan, Wang Haiguang, Sun Chengzhen and Zhang Philipp, "A fractional soft handover scheme for 3GPP LTE-Advanced System," in Proc. of the 2009 IEEE International Conference, pp.1-5, June 14-18, 2009.
- NIEMI V, NYBERG K. UMTS security. John Wiley & Sons ,UK,2003.
- 3GPP. Security objectives and principles. 3GPP TS33.120, 2001.
- 3G Security, Security Architecture (Release 11), 3GPP TS 33.102, Version 11.1.0, 2011.
- 3GPP System Architecture Evolution (SAE), Security Architecture(Release 11), 3GPP TS 33.401, v11.2.0, 2011.
- Hyun-Seo Park, Yong-Seouk Choi, Byung-Chul Kim, and Jae-Yong Lee, "LTE mobility enhancements for evolution into 5G," ETRI Journal, vol. 37, no. 6, pp. 1065-1076, December, 2015. https://doi.org/10.4218/etrij.15.0115.0529
- Chen Jengyueng, Yang Chunchuan and Mai Yiting, "A Novel Smart Forwarding Scheme in LTE-Advanced Networks," China Communications, vol. 12, no. 3, pp. 120-131, March 2015. https://doi.org/10.1109/CC.2015.7084370
- Mohmad Anas, Francesco D. Calabrese, Preben E.Mogensen, Claudio Rosa and Klaus I. Pedersen, "Performance evaluation of received signal strength based hard handover for UTRAN LTE," in Proc. of the IEEE 65th Vehicular Technology Conference, pp.1046-1050, April 22-25, 2007.
- Dan Forsberg, Huang Leping, Kashima Tsuyoshi and Seppo Alanara, "Enhancing security and privacy in 3GPP EUTRAN radio interface," in Proc. of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp.1-5, September 3-7, 2007.
- Danny Dolev and Andrew ChiChih Yao, "On the Security of Public Key Protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-208, October, 1983. https://doi.org/10.1109/TIT.1983.1056650
- Noomene Ben, Henda and Karl Norrman, "Formal Analysis of Security Procedures in LTE - A Feasibility Study," Lecture Notes in Computer Science Springer International Publishing, vol. 8688, pp. 341-361, 2014.