First International Conference on Availability, Reliability and Security (ARES'06) 2006
DOI: 10.1109/ares.2006.119
|View full text |Cite
|
Sign up to set email alerts
|

Secure 3G user authentication in adhoc serving networks

Abstract: The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN.With limited capacity to determine a user's location only to within a current cell and restrictions o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…The merging of 4G and WLAN networks prompts the needs of operators to increase their coverage with a blended service offering that makes best use of their old investments in legacy infrastructure, low price technology and new technology at the least price to address the higher volume of delivered rich data services [1]. Studies have shown that mobile data services are hindered by too much complexity and too many different tariff models.…”
Section: Introductionmentioning
confidence: 99%
“…The merging of 4G and WLAN networks prompts the needs of operators to increase their coverage with a blended service offering that makes best use of their old investments in legacy infrastructure, low price technology and new technology at the least price to address the higher volume of delivered rich data services [1]. Studies have shown that mobile data services are hindered by too much complexity and too many different tariff models.…”
Section: Introductionmentioning
confidence: 99%
“…These specifications use an Extensible Authentication Protocol–Authentication and Key Agreement (EAP‐AKA) protocol as the authentication and key exchange protocol to meet the security needs of 3G/WLAN interworking. The aspects of security and efficiency of EAP‐AKA can still be improved , for example, for the protection of user ID anonymity, large computation in mobile stations (MSs), or large message exchange frequency. Moreover, a billing mechanism is not included in the EAP‐AKA protocol, which is one of the most important reasons why 3G/WLAN interworking is not yet popular.…”
Section: Introductionmentioning
confidence: 99%