2008
DOI: 10.1002/sec.30
|View full text |Cite
|
Sign up to set email alerts
|

Local fast re‐authentication for 3G‐WLAN interworking

Abstract: SummaryInterworking third-generation (3G) mobile communications systems and wireless local area networks (WLANs) is advantageous for both service providers and end users. However, securing such interworking architectures is a challenging task. EAP-AKA is the security protocol adopted by 3GPP to achieve authentication in 3G-WLAN interworking architectures. This paper proposes enhancements to EAP-AKA to improve performance and security during re-authentication. A novel protocol named local fast re-authentication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…We make use of an improved version of EAP-AKA, which distinctly minimizes re-authentication delays. In modified EAP-AKA protocol [12], the WAAA locally reauthenticates stationary users on behalf of HAAA and HSS. The strategy of localizing authentications within the WLAN domain reduces authentication delays and minimizes dependence on critical servers in the 3G Home Network (3GHN).…”
Section: B 3g-wlan Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…We make use of an improved version of EAP-AKA, which distinctly minimizes re-authentication delays. In modified EAP-AKA protocol [12], the WAAA locally reauthenticates stationary users on behalf of HAAA and HSS. The strategy of localizing authentications within the WLAN domain reduces authentication delays and minimizes dependence on critical servers in the 3G Home Network (3GHN).…”
Section: B 3g-wlan Authenticationmentioning
confidence: 99%
“…In addition, the UE generates a nonce, UN. 2) Five new keys are generated [12]. (a) A Root handover key, HOK is derived from EM SK by the HAAA and the UE only.…”
Section: B 3g-wlan Authenticationmentioning
confidence: 99%
“…[22], where the security and performance analyses are preliminary and limited. More thorough security and performance analyses were presented in [23].…”
Section: Proposed Ho Reauthentication Protocolsmentioning
confidence: 99%
“…[22], where the security and performance analyses are preliminary and limited. More thorough security and performance analyses were presented in [23]. The protocol in [22] was used in [24] to reduce HO delays between 3GPP and WLAN.…”
Section: Proposed Ho Reauthentication Protocolsmentioning
confidence: 99%
“…(b) The domain-level handover key, DHK is derived from HOK by HAAA and UE only This key is only derived by the UE and WAAA. The derivation is explained in [12].…”
Section: B 3g-wlan Authenticationmentioning
confidence: 99%