Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Authentications and Key Management in 3G-WLAN Interworking

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The successful deployment of WLAN for high speed data transmission and 3G cellular systems for wide coverage and global roaming has emerged to be a complementary platform for wireless data communications. But security in the 3G-WLAN interworking, especially the efficient authentication and valid key management, has been remaining a challenging issue. What’s more, some emerging security challenges are neglected by 3GPP specifications as well as the previous studies. This paper first analyzes and evaluates the current contributions in this field, and then puts forward some design issues. Thereafter, by modifying the EAP-AKA keying framework we propose an improved authentication scheme which enables a WLAN user to efficiently access packet switch services through the 3G networks. What’s more, through the new keying framework the user can efficiently realize the future re-authentications and handover authentications. The proposed authentication scheme, the corresponding re-authentications and handover authentications are simulated, and results indicate that our scheme can reduce authentication latency significantly.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. This is because the traffic of the fast re-authentication is higher than that of EAP-AKA, which will cost more propagation delay for the long distance between the UE and its HAAA server. While in non-roaming case, the fast re-authentication is more efficient than EAP-AKA because of the short distance between the UE and the HAAA server.

References

  1. Wang W, Liang W, Agarwal AK (2005) Integration of authentication and mobility management in third generation and WLAN data networks. Wirel Commun Mob Comput 6:665–678

    Article  Google Scholar 

  2. Koien G, Haslestad T (2003) Security aspects of 3G-WLAN interworking. IEEE Commun Mag 41:82–88

    Article  Google Scholar 

  3. ETSI (2008) 3G security; WLAN interworking security; system description. 3GPP TS 33.234 (v 8.1.0). Release 8 Mar 2008

  4. Arkko J, Haverinen H (2006) EAP-AKA authentication. RFC 4187

  5. Ntantogian C, Xenakis C (2009) One-pass EAP-AKA authentication in 3G-WLAN integrated networks. Wirel Pers Commun 4:569–584

    Article  Google Scholar 

  6. Prasithsangaree P, Krishnamurthy P (2004) A new authentication mechanism for loosely coupled 3G-WLAN integrated networks. In: IEEE 59th vehicular technology conference, vol 5, pp 2998–3003

  7. Kambourakis G, Rouskas A, Gritzalis S (2004) Advanced SSL/TLSbased authentication for secure WLAN-3G interworking. In: IEE communications proceedings, vol 5, pp 501–506

  8. Chen H, Zivkovic M, Plas D-J (2003) Transparent end-user authentication across heterogeneous wireless networks. In: IEEE 58th vehicular technology conference, vol 3, pp 2088–2092

  9. Simon D, Aboba B, Hurst R (2008) The EAP-TLS authentication protocol. RFC 5216

  10. Funk P, Blake-Wilson S (2008) Extensible authentication protocol tunneled transport layer security authenticated protocol version 0. RFC 5281

  11. Palekar A et al (2004) protected EAP protocol (PEAP). IETF Internet draft. draft-josefsson-pppext-eap-tls-eap-10.txt

  12. Salgarelli L, Buddhikot M, Garay J, Patel S, Miller S (2003) Efficient authentication and key distribution in wireless IP networks. IEEE Wirel Commun Mag 10(6):52–61

    Article  Google Scholar 

  13. Al Shidhani A, Leung VCM (2008) Local fast re-authentication for 3G-WLAN interworking architecture. In: Wireless telecommunications symposium, pp 1–8

  14. Lopez RM, Skarmeta AG et al (2006) Improved EAP keying framework for a secure mobility access service. In: 2006 international conference on wireless communications and mobile computing, pp 183–188

  15. IEEE (2005) Draft amendment to standard for information technology—telecommunications and information exchange between systems-LAN/MAN specific requirements—part 11: wireless medium access control (MAC) and physical layer specifications: amendment 8: fast BSS transition. IEEE Std 802.11r /D01.0

  16. Braun T, Hahnsang K (2005) Efficient authentication and authorization of mobile users based on peer-to-peer network mechanisms. In; Proceedings of the 38th annual Hawaii international conference on system sciences, HICSS’05, pp 306–313

  17. Lee M, Kim G, Park S (2005) Seamless and secure mobility management with location-aware service (LAS) broker for future mobile interworking networks. J Commun Netw 2:207–221

    Google Scholar 

  18. ETSI (2008) 3GPP system to WLAN interworking; system description. 3GPP TS 23.234 (v7.7.0). Release 7 June 2008

  19. Blunk L, Vollbrecht J (1998) PPP extensible authentication protocol (EAP). RFC 2284

  20. Kaufman C (2005) The internet key exchange (IKEv2) protocol. RFC 4306

  21. International Telecommunication Union (1988) General characteristics of international telephone connections and international telephone circuits. ITU-TG.114

  22. IEEE (2004) Medium access control (MAC) security enhancements, amendment 6 to IEEE standard for information Technology—telecommunications and information exchange between systems—local and metropolitan area networks—specific requirements—part 11: wireless LAN medium access control (MAC) and physical layer(PHY) specifications. IEEE Std. 802.11i-2004

  23. ETSI (2009) 3G security; security architecture. 3GPP TS 33.102 (v9.1.0). Release 9 December 2009

  24. OPNET Modeler Radio (2003) http://www.opnet.com

  25. ETSI (2001) Report on the design and evaluation of the MILENAGE algorithm set; deliverable 5: an example algorithm for the 3GPP authentication and key generation functions. 3GPP TR 33.909 (v4.0.1). Release 4 June 2001

  26. Kwon H, Cheon K, Ro K, Park A (2006) USIM based authentication test-bed for UMTS-WLAN handover. In: IEEE INFOCOM 2006 poster & demos. http://www.ieee-infocom.org/2006/postersandemos.htm

  27. Bangolae S, Bell C, Qi E (2006) Performance study of fast BSS transition using IEEE 802.11r. In: Proceedings of the 2006 international conference on wireless communications and mobile computing, pp 737–742

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinghua Li.

Additional information

This work is supported by the National Natural Science Foundation of China (60702059, 60872041, 60972078), the Key Program of National Natural Science Foundation of China (60633020), the Opening Foundation of Key Lab of Cryptglogic Technology and Information Security, Ministry of Education, Shandong University, funds of Key Lab of Fujian Province University Network Security and Cryptology (09A001), the Fundamental Research Funds for the Central Universities, Mobile Network Security Technology Research Center of Kyungpook National University.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, X., Lu, X., Ma, J. et al. Authentications and Key Management in 3G-WLAN Interworking. Mobile Netw Appl 16, 394–407 (2011). https://doi.org/10.1007/s11036-010-0257-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-010-0257-3

Keywords

Navigation