Skip to main content
Top

2015 | OriginalPaper | Chapter

24. A Study on High Security Authentication Mechanism for 3G/WLAN Networks

Authors : Wei-Chen Wu, Horng-Twu Liaw

Published in: Ubiquitous Computing Application and Wireless Sensor

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Because of the more and more services wireless communication technology can offer nowadays, the quality of wireless communication became an important key. In this research, 3G/UMTS and WLAN, which are two major wireless communication techniques will be mentioned mainly. The former offers a wide-range, high-movability, complete and safe record of accounting; the latter offers a narrow-range, low-movability, high-speed-transmission access on the Internet. The complementary between these two techniques can not only enhance the quality of wireless communication but offer more services for customers to choose, and customers can use wireless application services regardless of any environmental limit. This research will focus on the problem of fast-handover when 3G/UMTS and WLAN is interworking, such as authentication and authorization. About the two formers, we will use W-SKE to accomplish authentication procedure, and achieve safer Mutual Full Authentication and Fast-Authentication.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference GPP TR 22.934 (2003) Feasibility study on 3GPP system to wireless local area network (WLAN) interworking (release 6) GPP TR 22.934 (2003) Feasibility study on 3GPP system to wireless local area network (WLAN) interworking (release 6)
2.
go back to reference GPP TS 22.234 (2004) 3GPP system to wireless local area network (WLAN) interworking, system description (release 6) GPP TS 22.234 (2004) 3GPP system to wireless local area network (WLAN) interworking, system description (release 6)
3.
go back to reference GPP TS 33.234 (2006) 3G securtiy; wireless local area network (WLAN) interworking security (release 7) GPP TS 33.234 (2006) 3G securtiy; wireless local area network (WLAN) interworking security (release 7)
4.
go back to reference Buddhikot M, Chandranmenon G, Han S, Lee YW, Miller S, Salgarelli L (2003) Integration of 802.11 and third-generation wireless data networks. In: Proceedings of the IEEE INFOCOM’03 Buddhikot M, Chandranmenon G, Han S, Lee YW, Miller S, Salgarelli L (2003) Integration of 802.11 and third-generation wireless data networks. In: Proceedings of the IEEE INFOCOM’03
5.
go back to reference Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. Member, IEEE Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. Member, IEEE
6.
go back to reference Salgrelli L, Buddhikot M, Garay J, Patel S, Miller S (2003) Efficient authentication and key distribution in wireless IP networks. Bell Laboratories, Lucent Technologies, IEEE Wireless Communication, Dec 2003 Salgrelli L, Buddhikot M, Garay J, Patel S, Miller S (2003) Efficient authentication and key distribution in wireless IP networks. Bell Laboratories, Lucent Technologies, IEEE Wireless Communication, Dec 2003
7.
go back to reference Kambourakis G, Rouskas A, Kormentzas G, Gritzalis S (2004) Advanced SSL/TLS-Based authentication for secure WLAN-3G interworking. In: Communications, IEE proceedings, vol 151 Kambourakis G, Rouskas A, Kormentzas G, Gritzalis S (2004) Advanced SSL/TLS-Based authentication for secure WLAN-3G interworking. In: Communications, IEE proceedings, vol 151
8.
go back to reference Prasithsangaree P, Krishnamuthy P (2004) A new authentication mechanism for loosely coupled 3G-WLAN integrated networks. In: IEEE vehicular technology conference Prasithsangaree P, Krishnamuthy P (2004) A new authentication mechanism for loosely coupled 3G-WLAN integrated networks. In: IEEE vehicular technology conference
9.
go back to reference Tsen Y-M, Yang C-C, Su J-H (2004) An efficient protocol for integrating WLAN and cellular networks. In: The 6th international conference on advanced communication technology Tsen Y-M, Yang C-C, Su J-H (2004) An efficient protocol for integrating WLAN and cellular networks. In: The 6th international conference on advanced communication technology
11.
go back to reference IETF Draft (2006) Extensible authentication protocol method for 3rd generation authentication an key agreement (EAP-AKA). RFC 4187 IETF Draft (2006) Extensible authentication protocol method for 3rd generation authentication an key agreement (EAP-AKA). RFC 4187
12.
go back to reference Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772 Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772
13.
go back to reference Krawczyk H, Bellare M, Canetti R (1997) Keyed-hashing for message authentication. Request for comments RFC2104, IETF Krawczyk H, Bellare M, Canetti R (1997) Keyed-hashing for message authentication. Request for comments RFC2104, IETF
Metadata
Title
A Study on High Security Authentication Mechanism for 3G/WLAN Networks
Authors
Wei-Chen Wu
Horng-Twu Liaw
Copyright Year
2015
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-017-9618-7_24