Securing Virtual Private Networks with SIM Authentication

被引:0
作者
Bjornstad, Torstein [1 ]
Jorstad, Ivar [2 ]
Do Van Thanh [1 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
[2] Ubisafe, Lillehammer, Norway
来源
THIRD IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS - WIMOB 2007 | 2007年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever increasing amount of systems requiring user authentication, users are experiencing a substantial inconvenience. A huge amount of passwords needs to be remembered, which in many cases decrease system security, as users choose to write them down or use the same password for several systems. The number of username/password pairs has simply become unmanageable. Other, stronger authentication mechanisms are added to some systems, which increase administration costs for the enterprises/service providers. There is an immediate need for a stronger, yet at the same time simpler and cost-efficient authentication mechanism which can be reused across many different types of services. This paper proposes a novel VPN solution which employs the GSM SIM authentication mechanism for authenticating users towards VPN networks and for setting up the encrypted tunnel between the VPN client and server. The solution ensures strong security, is user-friendly and cost-efficient.
引用
收藏
页数:6
相关论文
共 50 条
[31]   Distributed weakness in virtual private networks [J].
Patton, S ;
Doss, D ;
Yurcik, W .
25TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS - PROCEEDINGS, 2000, :96-97
[32]   Virtual private networks: Leveraging the Internet [J].
Ortiz, S .
COMPUTER, 1997, 30 (11) :18-20
[33]   Generic model for virtual private networks [J].
Weng, Liang ;
Zhu, Hongwen .
Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 1999, 33 (01) :80-83
[34]   Resource management for virtual private networks [J].
Raghunath, Satish ;
Ramakrishnan, K. K. .
IEEE COMMUNICATIONS MAGAZINE, 2007, 45 (04) :38-44
[35]   Mobile IP and virtual private networks [J].
Bhagavathula, R ;
Thanthry, N ;
Pendse, R .
IEEE 56TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2002, VOLS 1-4, PROCEEDINGS, 2002, :2414-2418
[36]   Overview on MPLS virtual private networks [J].
Halimi, A ;
Statovci-Halimi, B .
PHOTONIC NETWORK COMMUNICATIONS, 2002, 4 (02) :115-131
[37]   Scalability implications of virtual private networks [J].
De Clercq, J ;
Paridaens, O .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (05) :151-157
[38]   Privacy issues in virtual private networks [J].
Strayer, WT .
COMPUTER COMMUNICATIONS, 2004, 27 (06) :517-521
[39]   Overview on MPLS Virtual Private Networks [J].
Artan Halimi ;
Brikena Statovci-Halimi .
Photonic Network Communications, 2002, 4 :115-131
[40]   VIRTUAL PRIVATE NETWORKS - MARKET STRATEGIES [J].
WESTGATE, T .
TELECOMMUNICATIONS POLICY, 1993, 17 (01) :86-87