The digital signature standard
Communications of the ACM
Password authentication with insecure communication
Communications of the ACM
On the cost of virtual private networks
IEEE/ACM Transactions on Networking (TON)
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Robust generalized MQV key agreement protocol without using one-way hash functions
Computer Standards & Interfaces
Integrating Wireless LAN and Cellular Data for the Enterprise
IEEE Internet Computing
Mobile Networks and Applications - Security in mobile computing environments
Your 80211 wireless network has no clothes
IEEE Wireless Communications
Wireless LAN access network architecture for mobile operators
IEEE Communications Magazine
A heterogeneous-network aided public-key management scheme for mobile ad hoc networks
International Journal of Network Management
USIM-based EAP-TLS authentication protocol for wireless local area networks
Computer Standards & Interfaces
SETNR/A: an agent-based secure payment protocol for mobile commerce
International Journal of Intelligent Information and Database Systems
An efficient dynamic group key agreement protocol for imbalanced wireless networks
International Journal of Network Management
Adaptation of agent-based non-repudiation protocol to mobile digital right management (DRM)
Expert Systems with Applications: An International Journal
Performance evaluation of authentication certificate based seamless vertical handoff in GPRS-WLAN
HPCA'09 Proceedings of the Second international conference on High Performance Computing and Applications
Hi-index | 0.00 |
Wireless communications have developed rapidly and have been applied for many services. Cellular (the third-generation) mobile networks and wireless local area network (WLAN) are two important technologies for providing wireless communications. The third-generation (3G) networks provide wider service areas, and “always-o” and ubiquitous connectivity with low-speed data rate. WLAN networks offer higher data rate and the easy compatibility of wired Internet, but cover smaller areas. In fact, 3G and WLAN possess complementary properties. Integrating 3G and WLAN networks may offer subscribers high-speed wireless data services and ubiquitous connectivity. For integrating two heterogeneous networks, several issues should be involved, authentication, billing, quality of service, and seamless roaming between 3G and WLAN networks. In this paper, we address the authentication and billing problems and propose two protocols that provide both authentication and billing services. One protocol utilizes a one-time password approach to authenticate subscribers. This protocol is efficient in both computation time and authentication procedures. Because of the restrictions of the password-based approach, this protocol could not offer the non-repudiation property for the billing problem. Another protocol is constructed on a public-key-based system (i.e., certificates). Although it requires more computation time than the password-based approach, non-repudiation is guaranteed. Performance analysis simulation results are given to validate our two protocols.