Securing Virtual Private Networks with SIM Authentication

被引:0
作者
Bjornstad, Torstein [1 ]
Jorstad, Ivar [2 ]
Do Van Thanh [1 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
[2] Ubisafe, Lillehammer, Norway
来源
THIRD IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS - WIMOB 2007 | 2007年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever increasing amount of systems requiring user authentication, users are experiencing a substantial inconvenience. A huge amount of passwords needs to be remembered, which in many cases decrease system security, as users choose to write them down or use the same password for several systems. The number of username/password pairs has simply become unmanageable. Other, stronger authentication mechanisms are added to some systems, which increase administration costs for the enterprises/service providers. There is an immediate need for a stronger, yet at the same time simpler and cost-efficient authentication mechanism which can be reused across many different types of services. This paper proposes a novel VPN solution which employs the GSM SIM authentication mechanism for authenticating users towards VPN networks and for setting up the encrypted tunnel between the VPN client and server. The solution ensures strong security, is user-friendly and cost-efficient.
引用
收藏
页数:6
相关论文
共 50 条
[21]   Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks [J].
Luis Sánchez ;
Jorge Lanza ;
Luis Muñoz ;
Kimmo Ahola ;
Mikko Alutoin .
Wireless Personal Communications, 2010, 52 :393-409
[22]   External Authentication Approach for Virtual Private Network using LDAP [J].
Shrivastava, Anupriya ;
Rizvi, M. A. .
2014 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & SOFT COMPUTING (ICNSC), 2014, :50-54
[23]   Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks [J].
Sanchez, Luis ;
Lanza, Jorge ;
Munoz, Luis ;
Ahola, Kimmo ;
Alutoin, Mikko .
WIRELESS PERSONAL COMMUNICATIONS, 2010, 52 (02) :393-409
[24]   Virtual private networks - how they work [J].
Younglove, R .
COMPUTING & CONTROL ENGINEERING JOURNAL, 2000, 11 (06) :260-262
[25]   Integrity for virtual private routed networks [J].
Bush, R ;
Griffin, TG .
IEEE INFOCOM 2003: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2003, :1467-1476
[26]   Future of virtual private networks (VPN) [J].
Bajenesco, T.I. .
Technische Mitteilungen (Schweizerische Post-, Telephon- und Telegraphenbetriebe), 73 (07)
[27]   New economical virtual private networks [J].
Ben-Ameur, W ;
Kerivin, H .
COMMUNICATIONS OF THE ACM, 2003, 46 (06) :69-73
[28]   Virtual private networks simplify communications [J].
Bellm, M .
CONTROL ENGINEERING, 1998, 45 (06) :50-50
[29]   Resource management for virtual private networks [J].
Raghunath, Satish ;
Ramakrishnan, K. K. .
IEEE COMMUNICATIONS MAGAZINE, 2007, 45 (04) :38-44
[30]   Mobile IP and virtual private networks [J].
Bhagavathula, R ;
Thanthry, N ;
Pendse, R .
IEEE 56TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2002, VOLS 1-4, PROCEEDINGS, 2002, :2414-2418