Authentication and Billing Protocols for the Integration of WLAN and 3G Networks

  • Authors:
  • Yuh-Min Tseng;Chou-Chen Yang;Jiann-Haur Su

  • Affiliations:
  • Department of Mathematics, National Changhua University of Education, Jin-De Campus, Chang-Hua, Taiwan 500, R.O.C. ymtseng@cc.ncue.edu.tw tymy@ms45.hinet.net;Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung County, Taiwan 413, R.O.C.;Graduate Institute of Networking and Communication Engineering, Chaoyang University of Technology, Taichung County, Taiwan 413, R.O.C.

  • Venue:
  • Wireless Personal Communications: An International Journal
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Wireless communications have developed rapidly and have been applied for many services. Cellular (the third-generation) mobile networks and wireless local area network (WLAN) are two important technologies for providing wireless communications. The third-generation (3G) networks provide wider service areas, and “always-o” and ubiquitous connectivity with low-speed data rate. WLAN networks offer higher data rate and the easy compatibility of wired Internet, but cover smaller areas. In fact, 3G and WLAN possess complementary properties. Integrating 3G and WLAN networks may offer subscribers high-speed wireless data services and ubiquitous connectivity. For integrating two heterogeneous networks, several issues should be involved, authentication, billing, quality of service, and seamless roaming between 3G and WLAN networks. In this paper, we address the authentication and billing problems and propose two protocols that provide both authentication and billing services. One protocol utilizes a one-time password approach to authenticate subscribers. This protocol is efficient in both computation time and authentication procedures. Because of the restrictions of the password-based approach, this protocol could not offer the non-repudiation property for the billing problem. Another protocol is constructed on a public-key-based system (i.e., certificates). Although it requires more computation time than the password-based approach, non-repudiation is guaranteed. Performance analysis simulation results are given to validate our two protocols.