SIM Based WLAN Authentication for Open Platforms

نویسندگان

  • Abhay Dharmadhikari
  • Uttam Sengupta
  • Ameen Ahmad
  • Roger Chandler
چکیده

2. Overview of GSM SIM Based Authentication This paper discusses approaches to authenticating users with open platforms, such as notebook PCs, for WLAN access using SIM cards. Using SIM cards to authenticate WLAN access is desirable by wireless operators as this approach minimizes additional infrastructure investments since the existing authentication processes and equipment are re-used. This paper starts with an overview of the authentication methodology in today’s GSM networks. Applying the GSM authentication methodology in a WLAN environment is then discussed. Enabling use of open platforms in WLANs requires consideration of potential security threats to authentication data due to the presence of open pathways. These open pathways are illustrated and possible mitigation techniques are discussed. With the appropriate mitigation approaches, SIM based user authentication can be easily extended to the WLAN environment. 2.1. SIM Subscriber Identity Module The role of SIM in GSM networks is to ensure that only authorized users can access the network. In order to properly authenticate a user, it must be able to store data, guard against unauthorized access to the stored data, and execute a cryptographic algorithm under secure conditions. The SIM and mobile device is authenticated with a background system. The data transferred between the mobile station and base station across the air interface is encrypted. 2.2. SIM Authentication on GSM Networks

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SIM-based subscriber authentication mechanism for wireless local area networks

Authentication and roaming are two critical issues for the integration of heterogeneous networks, such as the integration of WLAN access networks and mobile cellular networks. Due to the strong points of mobile cellular networks, it is favorable to integrate the authentication mechanism ofWLAN access networks into that of mobile cellular networks. For GSM/GPRS networks, the subscriber identity ...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Performance Evaluation of the Fast Authentication Schemes in GSM-WLAN Heterogeneous Networks

In GSM-WLAN heterogeneous networks, the authentication efficiency is one of the drawbacks for message transaction and processing in the RADIUS server. This paper proposed two fast authentication schemes, based on the EAP-SIM mechanism, to improve the authentication efficiency by balancing the message transaction loads and processing loads among the RADIUS server and individual APs. In this pape...

متن کامل

Transparent End-User Authentication Across Heterogeneous Wireless Networks

With the increasing number of mobile and wireless networks that are deployed, the handovers between these systems take place more often. In order to provide end-users with uninterrupted access to services, support for fast handover is essential. One of the prerequisites of a fast-handover is transparent end-user authentication. In this paper we address end-user authentication at network level. ...

متن کامل

Seamless Handover in WLAN and Cellular Networks through Intelligent Agents

With the increasing demand of the mobility of mobile users, seamless handover is a critical issue for heterogeneous network accesses. Improving the blocking probability of SIP calls resulting from the handoff delay is a key issue for achieving seamless handovers across WLAN and cellular networks. This paper presents an efficient scheme, based on intelligent agents, to support pre-authentication...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003