2004
DOI: 10.1049/ip-com:20040835
|View full text |Cite
|
Sign up to set email alerts
|

Advanced SSL∕TLS-based authentication for secure WLAN-3G interworking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2005
2005
2017
2017

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(29 citation statements)
references
References 6 publications
0
28
0
Order By: Relevance
“…The Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) [12] is executed during INEA to achieve mutual authentication between the MS and the HSS/HAAA in the UMTS-WiMAX interworking architecture [10]. In EAP-AKA, the HSS/HAAA and the MS exchange series of request/reply messages, which introduces costly traffic overhead practically leads to high delays [13,14].…”
Section: Introductionmentioning
confidence: 99%
“…The Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) [12] is executed during INEA to achieve mutual authentication between the MS and the HSS/HAAA in the UMTS-WiMAX interworking architecture [10]. In EAP-AKA, the HSS/HAAA and the MS exchange series of request/reply messages, which introduces costly traffic overhead practically leads to high delays [13,14].…”
Section: Introductionmentioning
confidence: 99%
“…The protocol does not address key management operations which are essential in 3G-WLAN interworking systems. Differently from protocols suggested in References [8][9][10][11][12][13][14], LFR attains faster re-authentication and maintains a high state of security. Firstly, it does not require the usage of public key operations.…”
Section: Proposed Local Fast Re-authentication Protocolmentioning
confidence: 99%
“…To address long (re-)authentication delays and UE privacy problems, Kambourakis et al [8], Prasithsangaree et al [9], and Chen et al [10] proposed using EAP-transport layer security (EAP-TLS), EAP-tunneled TLS (EAP-TTLS), and protected EAP (PEAP), respectively, instead of EAP-AKA to authenticate a UE in the 3G-WLAN interworking architecture. These solutions are capable of minimizing (re-) authentication delays because there is no need to retrieve AVs from HLR/HSS and authentications might be performed locally in the WLAN domain.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…With the goal of overcoming these flaws, in [21] and more recently in [24] can be found proposals of tunnelled end-to-end authentication schemes based on EAP-TLS [25] or EAP-TTLS [26] over the 3G/WLAN interworking architecture. Other previous working lines, have aimed to make more robust the subscriber authentication and authorization on the basis of temporary attributes certificates [27].…”
Section: Related Workmentioning
confidence: 99%