Improved IPSec tunnel establishment for 3GPP-WLAN interworking

被引:2
作者
Samoui, S. [1 ]
El Bouabidi, I. [1 ]
Obaidat, M. S. [2 ]
Zarai, F. [1 ]
Hsiao, K. F. [3 ]
Kamoun, L. [1 ]
机构
[1] Univ Sfax, LETI Lab, Sfax, Tunisia
[2] Monmouth Univ, Comp Sci & Software Engn Dept, West Long Branch, NJ 07764 USA
[3] Ming Chuan Univ, Dept Informat Management, Taipei 333, Taoyuan County, Taiwan
关键词
3GPP LTE; WLAN; Interworking; Security; AVISPA; PROTOCOLS;
D O I
10.1002/dac.2769
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Interworking between wireless local area network (WLAN) and the 3rd Generation Partnership Project (3GPP) such as Long Term Evolution (LTE) is facing more and more problems linked to security threats. Securing this interworking is a major challenge because of the vastly different architectures used within each network. Therefore, security is one of the major technical concerns in wireless networks that include measures such as authentication and encryption. Among the major challenges in the interworking security is the securing of the network layer. The goal of this article is twofold. First, we propose a new scheme to secure 3GPP LTE-WLAN interworking by the establishment of an improved IP Security tunnel between them. The proposed solution combines the Internet Key Exchange (IKEv2) with the Host Identity Protocol (HIP) to set up a security association based on two parameters, which are location and identity. Our novel scheme, which is called HIP_IKEv2, guarantees better security properties than each protocol used alone. Second, we benefit from Mobile Internet Key Exchange protocol (MOBIKE) in case of mobility events (handover). And we extend HIP_IKEv2 to HIP_MOBIKEv2 protocol in order to reduce the authentication signaling traffic. The proposed solution reinforces authentication, eliminates man-in-the-middle attack, reduces denial-of-service attack, assures the integrity of messages, and secures against reply attack. Finally, our proposed solution has been modeled and verified using the Automated Validation of Internet Security Protocols and Applications and the Security Protocol Animator, which has proved its security when an intruder is present. Copyright (C) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1180 / 1199
页数:20
相关论文
共 36 条
  • [1] 3GPP Technical Specification Group Services and System Aspects, 2009, 33402 3GPP TS
  • [2] An application of the context transfer protocol: IPsec in a IPv6 mobility environment
    Allard, Fabien
    Bonnin, Jean-Marie
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2008, 1 (01) : 110 - 126
  • [3] [Anonymous], 2006, ARTIST2 WORKSHOP SEC
  • [4] [Anonymous], IST200139252 AVISPA
  • [5] [Anonymous], INT J COMPUT SCI
  • [6] ARKKO J, 2006, 4187 IETF RFC
  • [7] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
  • [8] Cabellos-Aparicio A, 2005, LECT NOTES COMPUT SC, V3431, P203, DOI 10.1007/978-3-540-31966-5_16
  • [9] Celentano D, 2006, SOFTCOM 2006: INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, P331
  • [10] Tools for cryptographic protocols analysis: A technical and experimental comparison
    Cheminod, Manuel
    Bertolotti, Ivan Cibrario
    Durante, Luca
    Sisto, Riccardo
    Valenzano, Adriano
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 954 - 961