Securing Virtual Private Networks with SIM Authentication

被引:0
作者
Bjornstad, Torstein [1 ]
Jorstad, Ivar [2 ]
Do Van Thanh [1 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
[2] Ubisafe, Lillehammer, Norway
来源
THIRD IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS - WIMOB 2007 | 2007年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever increasing amount of systems requiring user authentication, users are experiencing a substantial inconvenience. A huge amount of passwords needs to be remembered, which in many cases decrease system security, as users choose to write them down or use the same password for several systems. The number of username/password pairs has simply become unmanageable. Other, stronger authentication mechanisms are added to some systems, which increase administration costs for the enterprises/service providers. There is an immediate need for a stronger, yet at the same time simpler and cost-efficient authentication mechanism which can be reused across many different types of services. This paper proposes a novel VPN solution which employs the GSM SIM authentication mechanism for authenticating users towards VPN networks and for setting up the encrypted tunnel between the VPN client and server. The solution ensures strong security, is user-friendly and cost-efficient.
引用
收藏
页数:6
相关论文
共 50 条
[41]   SIM-based subscriber authentication mechanism for wireless local area networks [J].
Tsai, Yuh-Ren ;
Chang, Cheng-Ju .
COMPUTER COMMUNICATIONS, 2006, 29 (10) :1744-1753
[42]   A cumulative authentication method for securing source routing protocols in ad hoc networks [J].
Moussakhani, B. ;
Safavi, S. M. ;
Ebrahimzad, H. .
CHINA COMMUNICATIONS, 2007, 4 (01) :40-47
[43]   A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks [J].
Moussakhani, B. ;
Safavi, S. M. ;
Ebrahimzad, H. .
2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, 2006,
[44]   Hash message authentication codes for securing data in wireless body area networks [J].
Nagasundharamoorthi, Insozhan ;
Venkatesan, Prabhu ;
Velusamy, Parthasarathy .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (05)
[45]   A robust authentication and access control protocol for securing wireless healthcare sensor networks [J].
Ali, Zeeshan ;
Ghani, Anwar ;
Khan, Imran ;
Chaudhry, Shehzad Ashraf ;
Islam, S. K. Hafizul ;
Giri, Debasis .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
[46]   TAMBUS: A novel authentication method through covert channels for securing industrial networks [J].
Bernieri, Giuseppe ;
Cecconello, Stefano ;
Conti, Mauro ;
Lain, Gianluca .
COMPUTER NETWORKS, 2020, 183
[47]   A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks [J].
B.Moussakhani ;
S.M.Safavi ;
H.Ebrahimzad .
中国通信, 2007, 4 (01) :40-47
[48]   Securing Authentication Within Hadoop [J].
Kanyeba, Michael ;
Yu, Lasheng .
PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, MECHANICAL AND INDUSTRIAL ENGINEERING (ICEMIE), 2016, 51 :100-103
[49]   LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks [J].
Goel, Aarti ;
Sharma, Deepak Kumar ;
Gupta, Koyel Datta .
EXPERT SYSTEMS, 2022, 39 (05)
[50]   Models of synthesis of a distributed authentication system of a virtual private reconfigurable network [J].
Alguliev, RM .
JOURNAL OF COMPUTER AND SYSTEMS SCIENCES INTERNATIONAL, 2000, 39 (02) :297-306