Abstract
The successful deployment of WLAN for high speed data transmission and 3G cellular systems for wide coverage and global roaming has emerged to be a complementary platform for wireless data communications. But security in the 3G-WLAN interworking, especially the efficient authentication and valid key management, has been remaining a challenging issue. What’s more, some emerging security challenges are neglected by 3GPP specifications as well as the previous studies. This paper first analyzes and evaluates the current contributions in this field, and then puts forward some design issues. Thereafter, by modifying the EAP-AKA keying framework we propose an improved authentication scheme which enables a WLAN user to efficiently access packet switch services through the 3G networks. What’s more, through the new keying framework the user can efficiently realize the future re-authentications and handover authentications. The proposed authentication scheme, the corresponding re-authentications and handover authentications are simulated, and results indicate that our scheme can reduce authentication latency significantly.
Similar content being viewed by others
Notes
This is because the traffic of the fast re-authentication is higher than that of EAP-AKA, which will cost more propagation delay for the long distance between the UE and its HAAA server. While in non-roaming case, the fast re-authentication is more efficient than EAP-AKA because of the short distance between the UE and the HAAA server.
References
Wang W, Liang W, Agarwal AK (2005) Integration of authentication and mobility management in third generation and WLAN data networks. Wirel Commun Mob Comput 6:665–678
Koien G, Haslestad T (2003) Security aspects of 3G-WLAN interworking. IEEE Commun Mag 41:82–88
ETSI (2008) 3G security; WLAN interworking security; system description. 3GPP TS 33.234 (v 8.1.0). Release 8 Mar 2008
Arkko J, Haverinen H (2006) EAP-AKA authentication. RFC 4187
Ntantogian C, Xenakis C (2009) One-pass EAP-AKA authentication in 3G-WLAN integrated networks. Wirel Pers Commun 4:569–584
Prasithsangaree P, Krishnamurthy P (2004) A new authentication mechanism for loosely coupled 3G-WLAN integrated networks. In: IEEE 59th vehicular technology conference, vol 5, pp 2998–3003
Kambourakis G, Rouskas A, Gritzalis S (2004) Advanced SSL/TLSbased authentication for secure WLAN-3G interworking. In: IEE communications proceedings, vol 5, pp 501–506
Chen H, Zivkovic M, Plas D-J (2003) Transparent end-user authentication across heterogeneous wireless networks. In: IEEE 58th vehicular technology conference, vol 3, pp 2088–2092
Simon D, Aboba B, Hurst R (2008) The EAP-TLS authentication protocol. RFC 5216
Funk P, Blake-Wilson S (2008) Extensible authentication protocol tunneled transport layer security authenticated protocol version 0. RFC 5281
Palekar A et al (2004) protected EAP protocol (PEAP). IETF Internet draft. draft-josefsson-pppext-eap-tls-eap-10.txt
Salgarelli L, Buddhikot M, Garay J, Patel S, Miller S (2003) Efficient authentication and key distribution in wireless IP networks. IEEE Wirel Commun Mag 10(6):52–61
Al Shidhani A, Leung VCM (2008) Local fast re-authentication for 3G-WLAN interworking architecture. In: Wireless telecommunications symposium, pp 1–8
Lopez RM, Skarmeta AG et al (2006) Improved EAP keying framework for a secure mobility access service. In: 2006 international conference on wireless communications and mobile computing, pp 183–188
IEEE (2005) Draft amendment to standard for information technology—telecommunications and information exchange between systems-LAN/MAN specific requirements—part 11: wireless medium access control (MAC) and physical layer specifications: amendment 8: fast BSS transition. IEEE Std 802.11r /D01.0
Braun T, Hahnsang K (2005) Efficient authentication and authorization of mobile users based on peer-to-peer network mechanisms. In; Proceedings of the 38th annual Hawaii international conference on system sciences, HICSS’05, pp 306–313
Lee M, Kim G, Park S (2005) Seamless and secure mobility management with location-aware service (LAS) broker for future mobile interworking networks. J Commun Netw 2:207–221
ETSI (2008) 3GPP system to WLAN interworking; system description. 3GPP TS 23.234 (v7.7.0). Release 7 June 2008
Blunk L, Vollbrecht J (1998) PPP extensible authentication protocol (EAP). RFC 2284
Kaufman C (2005) The internet key exchange (IKEv2) protocol. RFC 4306
International Telecommunication Union (1988) General characteristics of international telephone connections and international telephone circuits. ITU-TG.114
IEEE (2004) Medium access control (MAC) security enhancements, amendment 6 to IEEE standard for information Technology—telecommunications and information exchange between systems—local and metropolitan area networks—specific requirements—part 11: wireless LAN medium access control (MAC) and physical layer(PHY) specifications. IEEE Std. 802.11i-2004
ETSI (2009) 3G security; security architecture. 3GPP TS 33.102 (v9.1.0). Release 9 December 2009
OPNET Modeler Radio (2003) http://www.opnet.com
ETSI (2001) Report on the design and evaluation of the MILENAGE algorithm set; deliverable 5: an example algorithm for the 3GPP authentication and key generation functions. 3GPP TR 33.909 (v4.0.1). Release 4 June 2001
Kwon H, Cheon K, Ro K, Park A (2006) USIM based authentication test-bed for UMTS-WLAN handover. In: IEEE INFOCOM 2006 poster & demos. http://www.ieee-infocom.org/2006/postersandemos.htm
Bangolae S, Bell C, Qi E (2006) Performance study of fast BSS transition using IEEE 802.11r. In: Proceedings of the 2006 international conference on wireless communications and mobile computing, pp 737–742
Author information
Authors and Affiliations
Corresponding author
Additional information
This work is supported by the National Natural Science Foundation of China (60702059, 60872041, 60972078), the Key Program of National Natural Science Foundation of China (60633020), the Opening Foundation of Key Lab of Cryptglogic Technology and Information Security, Ministry of Education, Shandong University, funds of Key Lab of Fujian Province University Network Security and Cryptology (09A001), the Fundamental Research Funds for the Central Universities, Mobile Network Security Technology Research Center of Kyungpook National University.
Rights and permissions
About this article
Cite this article
Li, X., Lu, X., Ma, J. et al. Authentications and Key Management in 3G-WLAN Interworking. Mobile Netw Appl 16, 394–407 (2011). https://doi.org/10.1007/s11036-010-0257-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-010-0257-3