Security technologies for the World Wide Web
Security technologies for the World Wide Web
Network Security with Openssl
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
PKI: Implementing and Managing E-Security
PKI: Implementing and Managing E-Security
Wireless IP and Building the Mobile Internet
Wireless IP and Building the Mobile Internet
Role-Based Access Control
Fine-grained control of security capabilities
ACM Transactions on Internet Technology (TOIT)
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
WLAN-GPRS integration for next-generation mobile data networks
IEEE Wireless Communications
Defending against flooding-based distributed denial-of-service attacks: a tutorial
IEEE Communications Magazine
Security aspects of 3G-WLAN interworking
IEEE Communications Magazine
Criminal investigation and forensic tools for smartphones
International Journal of Electronic Security and Digital Forensics
Network smart card performing U(SIM) functionalities in AAA protocol architectures
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Hi-index | 0.00 |
Third Generation Partnership Project (3GPP) has recently provided a cellular-WLAN interworking architecture as an add-on to 3GPP system specifications. This architecture can offer IP-based services, compatible with those obtainable by 3G packet switched domain, to a 3G subscriber who is connected via a WLAN. Following this approach, in this paper we propose extensions to current 3GPP specifications, implementing and experimenting with a hybrid WLAN-3G network architecture capable of supporting subscriber's certificates. We focus on attribute certificates, which are of major importance for user authorization and, due to their temporary nature, entail minimum concern regarding revocation issues. We emphasise on the necessary public key infrastructure incorporation which requires minimum changes in 3G core network elements and signalling and provide a list of the potential threats, which can be identified in a presumable deployment. Apart from the description and requirements of the proposed WLAN-3G architecture, particular emphasis is placed on the experimental evaluation of the performance of two alternative test-bed scenarios, which shows that digital certificates technology is not only feasible to implement in present and future heterogeneous mobile networks, but also can deliver flexible and scalable services to subscribers, without compromising security.