A Secure Registration Scheme for Femtocell Embedded Networks

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 240)


Recently, femtocell received a signification interest to improve the indoor coverage and provide better voice and data services. Lots of work has been done to improve the femtocell security, but still there are some issues which need to be addressed. Our contribution to the femtocell security is to protect secure zone (femtocell coverage area within macrocell) from unauthorized (non-CSG) users. In this paper, we propose a secure registration scheme for femtocell embedded network. In this scheme, only Closed Subscriber Group (CSG) users are allowed to access both the femtocell and macrocell services within the secure zone. By prioritizing the femtocell over macrocell within the secure zone, every user will try to camp on femtocell and invoke location registration to the femtocell as the user enters to the femtocell coverage area. If the user is within the allowed users list, the femtocell will allow the user otherwise femtocell will send a reject message to the user and also send the user information to the core network.


Femtocell Macrocell Closed subscriber group Location area update Secure zone 


  1. 1.
    Namgeol O, Han S, Kim H (2010) System capacity and coverage analysis of femtocell networks. In: WCNC, Sydney, pp 1–5Google Scholar
  2. 2.
    Chandrasekhar V, Andrews J, Gatherer A (2008) Femtocell networks: a survey. IEEE Commun Mag 46(9):59–67Google Scholar
  3. 3.
    Sang YJ, Hwang HG, Kim KS (2009) A self-organized femtocell for IEEE 802.16e system. In: GLOBECOM, pp 1–5Google Scholar
  4. 4.
    Chowdhury MZ, Trung BM, Jang YM (2011) Neighbor cell list optimization for femtocell-to-femtocell handover in dense femtocell networks. In: ICUFN, pp 241–245Google Scholar
  5. 5.
    Cao F, Fan Z (2010) The tradeoff between energy efficiency and system performance of femtocell deployment. ISWCS, UK, pp 315–319Google Scholar
  6. 6.
    Femtocell shipments flatline due to slow inventory burn rate. ABI research, Research report (2012)Google Scholar
  7. 7.
    Han C-K, Choi H-K, Kim I-H (2009) Building femtocell more secure with improved proxy signature. In: GLOBECOM, pp 1–6Google Scholar
  8. 8.
    Vanek T, Rohlik M (2011) Perspective security procedures for femtocell backbone. In: ICUMT, pp 1–4Google Scholar
  9. 9.
    Brassil J, Manadhata PK, (2012) Securing a femtocell-based location service. Mobile and wireless networking, pp 30–35Google Scholar
  10. 10.
    Zhang J, de la Roche G (2009) Femtocells: technologies and deploymentGoogle Scholar
  11. 11.
    3GPP TS 25.304 (2009) User equipment (UE) procedures in idle mode and procedures for cell reselection in connected mode. 3GPP-TSG RAN, 8.5.0Google Scholar
  12. 12.
    3GPP TS 25.467 (2010) UTRAN architecture for 3G Home Node B (HNB). 3GPP-TSG RAN, 9.3.0Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht(Outside the USA) 2013

Authors and Affiliations

  1. 1.University of IncheonIncheonKorea

Personalised recommendations