An efficient authentication protocol with anonymity for 3G/WLAN interworking

被引:0
|
作者
Chien, Hung-Yu [1 ]
Teng, Hung-Yi [2 ]
Chen, Yen-Cheng [1 ]
机构
[1] Natl Chi Nan Univ, Dept Informat Management, Puli, Nantou, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2008年 / 9卷 / 01期
关键词
3G/WLAN interworking; authentication; anonymity; EAP-AKA; error-correcting codes;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An efficient authentication protocol with low communication latency is crucial to the success of 3G/WLAN interworking for further services. This paper, based on error-correcting codes, one-way hashing function and symmetric key cryptography, proposes a new authentication scheme for integrated 3G/WLAN networks. The new scheme provides better anonymity because it does not expose users' identifiers on the air even they are authenticated for the first time while EAP-AKA will expose users' real identities when they visit new domains. Additionally, it greatly improves the communication performance.
引用
收藏
页码:15 / 24
页数:10
相关论文
共 50 条
  • [21] A NEW FAST RE-AUTHENTICATION METHOD FOR THE 3G-WLAN INTERWORKING BASED ON EAP-AKA
    El Idrissi, Younes El Hajjaji
    Zahid, Noureddine
    Jedra, Mohamed
    2013 20TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2013,
  • [22] An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 319 - 325
  • [23] Efficient authentication protocol with anonymity and key protection for mobile Internet users
    Jiang, Yan
    Zhu, Youwen
    Wang, Jian
    Xiang, Yong
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 : 179 - 191
  • [24] Modelling a biometric authentication protocol for 3G mobile systems using CSP
    Shaikh, Siraj A.
    Dimitriadis, Christos K.
    Proceedings of the IASTED International Conference on Communication, Network, and Information Security, 2005, : 7 - 12
  • [25] Highly efficient authenticated key agreement in integrated 3G/WLAN IP networks
    Chien, Hung-Yu
    Teng, Hung-Yi
    Chen, Yen-g Chen
    IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 258 - +
  • [26] Evaluation of authentication interworking methods among multiple WLAN service providers
    Lee, Wan Yeon
    Lee, Heejo
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2007, 20 (05) : 515 - 531
  • [27] Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    Park, CS
    COMPUTER NETWORKS, 2004, 44 (02) : 267 - 273
  • [28] Re-authentication Protocol from WLAN to LTE (ReP WLAN-LTE)
    Othmen, Salwa
    Zarai, Faouzi
    Obaidat, Mohammad S.
    Belghith, Aymen
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 1446 - 1451
  • [29] Identity-based Remote Authentication and Key Agreement Protocol with Anonymity
    Zhang Jianjun
    Wu Qiwu
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 14 - 17
  • [30] A Robust User Authentication Protocol with Anonymity, Deniability, Key Agreement and Efficiency
    Hsu, Chien-Lung
    Chuang, Yu-Hao
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 127 - 132