2013
DOI: 10.1002/sec.830
|View full text |Cite
|
Sign up to set email alerts
|

An authentication, authorization, and accounting mechanism for 3G/WLAN networks

Abstract: Both computer and telecommunication networks have developed rapidly and become much more popular recently. On the basis of the characteristics of the two networks, we can see that they are complementary. If we can integrate the most popular technologies of these two kinds of networks, the integration will result in a new, attractive network access method. From the viewpoints of both the user and the service provider, the advantages of the integration include increased profits and better support for services. H… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 19 publications
(19 reference statements)
0
3
0
Order By: Relevance
“…Cloud computing is the process of decomposing huge data computing processing programs into countless small programs through the network "cloud" and then processing and analyzing these small programs through a system composed of multiple servers to obtain results and return them to users. Its architecture can be divided into application layer, platform layer, data layer, infrastructure layer, and hardware virtualization layer [14,15]. Cloud accounting can be understood from two aspects.…”
Section: Cloud Accountingmentioning
confidence: 99%
“…Cloud computing is the process of decomposing huge data computing processing programs into countless small programs through the network "cloud" and then processing and analyzing these small programs through a system composed of multiple servers to obtain results and return them to users. Its architecture can be divided into application layer, platform layer, data layer, infrastructure layer, and hardware virtualization layer [14,15]. Cloud accounting can be understood from two aspects.…”
Section: Cloud Accountingmentioning
confidence: 99%
“…However, according to section II and Table 7, both protocols in [9] and [11] have security vulnerabilities. Although authentication parameters such as authentication vectors are generated by AAA, which reduces the calculation burden of HSS and the communication time delay between AAA and HSS in some protocols [12], [14], too many framework modifications are made from the original EAP-AKA protocol.…”
Section: B Performance Analysismentioning
confidence: 99%
“…Wu and Liaw [12] put forward authentication schemes for WLAN access and reauthentication for WLAN access mainly based on the techniques such as hash-based message authentication code, digital signature and hash chain, which can resist replay attack, guessing attack, masquerade attack, and etc. However, anonymity of the users is realized by using public key cryptosystems, which is impractical for UE with limited resources.…”
Section: Introduction and Analysis Of The Scheme Proposed By Wu Et Almentioning
confidence: 99%