3G and WLAN Interworking Security: Current Status and Key

@article{Yang20063GAW,
  title={3G and WLAN Interworking Security: Current Status and Key},
  author={Chou-Chen Yang and Kuan-Hao Chu and Ya-Wen Yang},
  journal={Int. J. Netw. Secur.},
  year={2006},
  volume={2},
  pages={1-13}
}
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to the low data rates (2Mbps highest for WCDMA). WLAN (Wireless Local Area Network) pro-vides hot spot coverage with high data rates (reaches 54Mbps while 802.11 a/g), but is subject to short range (reaches 100m the furthest) and lacking a roaming and mobility support. From the users' point of view, the Integration of… Expand
Re-authentication protocol from WLAN to LTE (ReP WLAN-LTE)
TLDR
This proposed re-authentication protocol from WLAN to LTE (ReP WLAN-LTE) provides perfect forward secrecy to guarantee stronger security, mutual authentication, and resistance to replay attack and presents optimal values for handoff latency and satisfactory loss rates, which meet the need for the quality of services. Expand
Enhanced fast iterative localized re-authentication protocol for UMTS-WLAN interworking
TLDR
The proposed work enhances the security on fast iterative localized re-authentication protocol with minimal authentication delay and minimum signaling cost and the security significance of the proposed protocol is verified with AVISPA security analyzer. Expand
The analysis of WLAN/3G interworking access based on a mobility model
TLDR
The dependency of user access to a Wireless Local Area Network (WLAN) cell in a WLAN and third generation (3G) telecommunication networks interworking is shown, which has been ignored before. Expand
Practical unified authentication for 3G-WLAN interworking
TLDR
A unified authentication scheme to achieve the unified secure access to 3G-WLAN interworking networks and provides a foundation for unified authentication based on public-key cryptography for the next generation wireless networks. Expand
An authentication, authorization, and accounting mechanism for 3G/WLAN networks
TLDR
This paper proposes a practical, efficient, and secure authentication, authorization, and accounting mechanism within the interworking architecture proposed by Third Generation Partnership Project 3GPP. Expand
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
TLDR
Two authentication methods are presented that demonstrate better performance in terms of authentication latency and energy consumption of a mobile terminal, compared to the 3G cellular network approach of home network transporting authentication vector to visited network. Expand
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol
TLDR
It is shown that AP-AKA has some drawbacks, including the huge bandwidth consumption between foreign network and the home network, the overhead of the stored space in the foreign network, and the overloaded home network with authentication of mobile stations. Expand
A Man-in-the-Middle Attack on 3G-WLAN Interworking
TLDR
A man-in-the-middle attack on 3G-WLAN internetworking is presented, where the attacker can stealthily eavesdrop on all the UE-initiated traffic from either 3G or WLAN during the protocol transforming and codec transcoding. Expand
A cocktail protocol with the Authentication and Key Agreement on the UMTS
TLDR
The goal of this protocol is to allow the SN to share some medicated authentication vectors that are calculated in advance and combined with a prescription at the authentication stage to overcome congenital defects of the UMTS-AKA protocol. Expand
Security middleware for IMS-WLAN interworking
The 3GPP proposes security architecture for Interworking WLAN-3GPP. However, it presents inefficiencies in the authentication procedure, which bring a greater consumption of radio resources,Expand
...
1
2
3
4
...

References

SHOWING 1-10 OF 55 REFERENCES
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
TLDR
This paper addresses the authentication and billing problems and proposes two protocols that provide both Authentication and billing services and is constructed on a public-key-based system. Expand
Security aspects of 3G-WLAN interworking
TLDR
WLAN systems are great for hot spot coverage, while 3G systems provide global coverage and the necessary network and management infrastructure to cater for security, roaming, and charging requirements, according to 3GPP-WLAN interworking. Expand
An efficient authentication protocol for integrating WLAN and cellular networks
TLDR
This paper addresses the authentication problem and proposes an efficient authentication protocol to let 3G subscribers can connect WLAN with higher data rate and can withstand guessing, replay and impersonation attacks. Expand
Secure universal mobility for wireless Internet
TLDR
This work describes the design, implementation and performance of a Secure Universal Mobility (SUM) architecture that separates the handlings of initial mobility management and user application signaling messages from user application traffic so that VPNs can be established only when needed, thus reducing the interruptions to users. Expand
3G-based access control for 3GPP-WLAN interworking
  • R. Cheng, Shiao-Li Tsao
  • Computer Science
  • 2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No.04CH37514)
  • 2004
TLDR
A novel access control mechanism which reuses the existing 3GPP authentication procedures over a secure3GPP infrastructure to obtain WLAN access to provide a convenient access to both networks in different environments. Expand
Advanced SSL/TLS-based authentication for secure WLAN-3G interworking
Motivated by the fact that the SSL protocol has proved its effectiveness in wired IP networks, recent research work has examined the potential use of this protocol in various wireless technologies.Expand
A secure context transfer scheme for integration of UMTS and 802.11 WLANs
  • Y. Ouyang, Chung-Hua Chu
  • Computer Science
  • IEEE International Conference on Networking, Sensing and Control, 2004
  • 2004
TLDR
The architecture for secure context transfer scheme is provided and it is shown that the context transfer between WLAN and UMTS is guaranteed in various aspect for example like user identity and new register can be protected avoid denial service, key reuse, and so on. Expand
Using SSL/TLS in authentication and key agreement procedures of future mobile networks
TLDR
This work discusses existing problems related to authentication and key agreement procedures (AKA), such as compromised authentication vectors attacks, as they appear in 2G and 3G systems, and proposes how SSL/TLS can be used to overcome these inefficiencies. Expand
A new authentication mechanism for loosely coupled 3G-WLAN integrated networks
TLDR
A new authentication mechanism based on the dual signature concept used in secure electronic transactions that can be used in a loosely coupled architecture is proposed and a preliminary evaluation of the energy performance and latency of the existing and proposed protocols are presented. Expand
WLAN-GPRS integration for next-generation mobile data networks
TLDR
This work discusses the general aspects of integrated WLANs and cellular data networks, and examines the generic interworking architectures that have been proposed in the technical literature, and proposes and explains two different inter working architectures, which feature different coupling mechanisms. Expand
...
1
2
3
4
5
...