Security technologies for the World Wide Web
Security technologies for the World Wide Web
SSL and TLS: designing and building secure systems
SSL and TLS: designing and building secure systems
The performance of public key-enabled kerberos authentication in mobile computing applications
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
SSL and TLS Essentials: Securing the Web with CD-ROM
SSL and TLS Essentials: Securing the Web with CD-ROM
Network Security with Openssl
IP for 3g: Networking Technologies for Mobile Communications
IP for 3g: Networking Technologies for Mobile Communications
PKI: Implementing and Managing E-Security
PKI: Implementing and Managing E-Security
Wireless IP and Building the Mobile Internet
Wireless IP and Building the Mobile Internet
IEEE Internet Computing
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
A lightweight reconfigurable security mechanism for 3G/4G mobile devices
IEEE Wireless Communications
Securing electronic commerce: reducing the SSL overhead
IEEE Network: The Magazine of Global Internetworking
On performance analysis of challenge/response based authentication in wireless networks
Computer Networks and ISDN Systems
PKI-based secure mobile access to electronic health services and data
Technology and Health Care
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
On performance analysis of challenge/response based authentication in wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A privacy protecting UMTS AKA protocol providing perfect forward secrecy
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
A USIM-based uniform access authentication framework in mobile communication
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Hi-index | 0.00 |
While mobile hosts are evolving into full-IP enabled devices, there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism in mobile communication systems beyond 3G (B3G). Work has already begun on such an "all-IP" end-to-end solution, commonly referred to as 4G systems. Fully fledged integration between heterogeneous networks, such as 2.5G, UMTS, WLAN, Bluetooth, and the Internet, demands fully compatible, time-tested, and reliable mechanisms to depend on. SSL protocol has proved its effectiveness in the wired Internet and it will probably be the most promising candidate for future wireless environments. In this paper, we discuss existing problems related to authentication and key agreement (AKA) procedures, such as compromised authentication vectors attacks, as they appear in current 2/2.5G/3G mobile communication systems, and propose how SSL, combined with public key infrastructure (PKI) elements, can be used to overcome these vulnerabilities. In this B3G environment, we perceive authentication as a service, which has to be performed at the higher protocol layers irrespective of the underlying network technology. Furthermore, we analyze the effectiveness of such a solution, based on measurements of a "prototype" implementation. Performance measurements indicate that SSL-based authentication can be possible in terms of service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users.