Providing security in 4G systems: unveiling the challenges

Mahdi Aiash, Glenford Mapp, Aboubaker Lasebae, Raphael Phan

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

28 Citations (Scopus)


Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a clear identification of potential threats, this paper attempts to outline the security challenges in 4G networks. A good way to achieve this is by investigating the possibility of extending current security mechanisms to 4G networks. Therefore, this paper uses the X.805 standard to investigate the possibility of implementing the 3G's Authentication and Key Agreement (AKA) protocol in a 4G communication framework such as Y-Comm. The results show that due to the fact that 4G is an open, heterogeneous and IP-based environment, it will suffer from new security threats as well as inherent ones. In order to address these threats without affecting 4G dynamics, Y-Comm proposes an integrated security module to protect data and security models to target security on different entities and hence protecting not only the data but, also resources, servers and users.

Original languageEnglish
Title of host publication6th Advanced International Conference on Telecommunications, AICT 2010
Number of pages6
Publication statusPublished - 2010
Externally publishedYes
EventAdvanced International Conference on Telecommunications 2010 - Barcelona, Spain
Duration: 9 May 201015 May 2010
Conference number: 6th (Proceedings)


ConferenceAdvanced International Conference on Telecommunications 2010
Abbreviated titleAICT 2010
Internet address


  • 4G systems
  • AKA protocol
  • IEEE X.805
  • Integrated secuiry layers
  • Targeted security models

Cite this