TY - JOUR ID - 30166 TI - Design and Simulation of a New Intelligent Authentication for Handover over 4G (LTE) Mobile Communication Network JO - The International Conference on Electrical Engineering JA - ICEENG LA - en SN - 2636-4433 AU - El Omda, Mahmoud AU - Megahed, Mohamed Helmy AU - Abdel Azeem, Mohamed Hassan AD - Dept. of Comm, Arab Academy for Science and Technology and Maritime Transport University, Cairo, Egypt. AD - Dept. of Comm, Canadian International College, Cairo, Egypt. Y1 - 2018 PY - 2018 VL - 11 IS - 11th International Conference on Electrical Engineering ICEENG 2018 SP - 1 EP - 12 KW - LTE Handover KW - Key Management KW - Desynchronization Attack KW - Man in the Middle Attack KW - KMU DO - 10.21608/iceeng.2018.30166 N2 - LTE has become the dominant mobile communication network as it provides higher data rate, higher level of security and more applicable services. The handover is a critical process as it needs to be rapid and accurate process. In the handover over the Long Term Evolution (LTE) standard security protocol, the key management takes place between the source eNodeB and target eNodeB under the Mobility Management Entity (MME) via X2 interface. 3GPP has specified some security mechanisms to ensure the safety of handover key management, but still there exist some vulnerabilities compromising the security of the handover process, such as desynchronization attack. This paper proposed a new Lightweight Intelligent authentication protocol, which solves the desynchronization attack, solves Man in The Middle Attack, and achieves shorter setup time. This protocol solves the desynchronization attack and Man in The MiddleAttack by adding a Certificate Authority (CA), which generates a certificate for each eNB of the LTE network. In addition, the proposed protocol achieves shorter setup time by applying a parallel key management and handover instead of sequential key management and handover with each eNB. The proposed protocol assumes a new method of authentication of the User Equipment (UE) by using a Key Management Unit (KMU).The proposed protocol is securely analyzed. In addition, measuring the performance analysis in terms of the communication overhead, computations overhead and setup time by using Eclipse Real Time Operating System program.  Finally, the proposed protocol is compared with the Standard protocol and MRN related work. UR - https://iceeng.journals.ekb.eg/article_30166.html L1 - https://iceeng.journals.ekb.eg/article_30166_8164ce3e5e7d9d755e4e50b7e2f220b2.pdf ER -