A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Hiperlan/2 public access interworking with 3G cellular systems
Wireless Networks
Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA)
Mobile Networks and Applications
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
Wireless Personal Communications: An International Journal
New directions in cryptography
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
GPRS-based WLAN authentication and auto-configuration
Computer Communications
Security aspects of 3G-WLAN interworking
IEEE Communications Magazine
3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
Kerberos based authentication for inter-domain roaming in wireless heterogeneous network
Computers & Mathematics with Applications
An efficient dynamic group key agreement protocol for imbalanced wireless networks
International Journal of Network Management
A wide-adapted bantam protocol for roaming across wireless areas
Wireless Networks
Hi-index | 0.00 |
Due to the rapid growth in popularity of Wireless Local Area Network (WLAN), wireless security has become one of many important research issues. For the WLAN security, the IEEE 802.1X standard provides an authentication framework that is based on the Extensible Authentication Protocols (EAP). In the EAP framework, there are many authentication protocols that have been proposed, in which each authentication protocol has some strengths and weaknesses, respectively. Most EAP authentication protocols lack two features: identity protection and withstanding man-in-the-middle attacks. In this paper, we first propose a novel symmetric-key based certificate distribution scheme based on Universal Subscriber Identity Module (USIM) cards in a cellular network. The symmetric-key based certificate distribution scheme allows mobile subscribers to obtain temporary certificates from the corresponding cellular network. Combining the proposed certificate distribution scheme with the EAP-TLS (Transport Layer Security) protocol, we present a new EAP authentication protocol called USIM-based EAP authentication protocol. The new EAP authentication protocol combining with USIM cards is an extension of the EAP-TLS protocol and also follows the EAP framework in the IEEE 802.1X standard. Compared to other EAP authentication protocols, the proposed protocol provides mutual authentication, strong identity protection and roaming capability between the cellular network and the WLAN networks.