An efficient authentication protocol with anonymity for 3G/WLAN interworking

被引:0
|
作者
Chien, Hung-Yu [1 ]
Teng, Hung-Yi [2 ]
Chen, Yen-Cheng [1 ]
机构
[1] Natl Chi Nan Univ, Dept Informat Management, Puli, Nantou, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2008年 / 9卷 / 01期
关键词
3G/WLAN interworking; authentication; anonymity; EAP-AKA; error-correcting codes;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An efficient authentication protocol with low communication latency is crucial to the success of 3G/WLAN interworking for further services. This paper, based on error-correcting codes, one-way hashing function and symmetric key cryptography, proposes a new authentication scheme for integrated 3G/WLAN networks. The new scheme provides better anonymity because it does not expose users' identifiers on the air even they are authenticated for the first time while EAP-AKA will expose users' real identities when they visit new domains. Additionally, it greatly improves the communication performance.
引用
收藏
页码:15 / 24
页数:10
相关论文
共 50 条
  • [31] The research and implementation of 3G terminal authentication service
    Fangzhou Zhang
    Xiaoyu Sheng
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 38 - 40
  • [32] An authentication protocol offering service anonymity of mobile device in ubiquitous environment
    Park, Jong Hyuk
    JOURNAL OF SUPERCOMPUTING, 2012, 62 (01) : 105 - 117
  • [33] IMPROVED EFFICIENT AUTHENTICATION SCHEME WITH ANONYMITY IN GLOBAL MOBILITY NETWORKS
    Chen, Chi-Tung
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (08): : 3319 - 3339
  • [34] An authentication protocol offering service anonymity of mobile device in ubiquitous environment
    Jong Hyuk Park
    The Journal of Supercomputing, 2012, 62 : 105 - 117
  • [35] Anonymity guarantees of the UMTS/LTE authentication and connection protocol
    Ming-Feng Lee
    Nigel P. Smart
    Bogdan Warinschi
    Gaven J. Watson
    International Journal of Information Security, 2014, 13 : 513 - 527
  • [36] A practical authentication protocol with anonymity for wireless access networks
    Chen, Yen-Cheng
    Chuang, Shu-Chuan
    Yeh, Lo-Yao
    Huang, Jiun-Long
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (10) : 1366 - 1375
  • [37] Lightweight Protocol for Anonymity and Mutual Authentication in RFID Systems
    Rahman, Musfiq
    Sampangi, Raghav V.
    Sampalli, Srinivas
    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 910 - 915
  • [38] Improvement of user authentication protocol with anonymity for wireless communications
    Hu, Bin
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    KUWAIT JOURNAL OF SCIENCE, 2014, 41 (01) : 155 - 169
  • [39] Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
    Braeken, An
    COMPUTER NETWORKS, 2020, 181
  • [40] Anonymity guarantees of the UMTS/LTE authentication and connection protocol
    Lee, Ming-Feng
    Smart, Nigel P.
    Warinschi, Bogdan
    Watson, Gaven J.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (06) : 513 - 527