A USIM-Based Uniform Access Authentication Framework in Mobile Communication

نویسندگان

  • Xinghua Li
  • Jianfeng Ma
  • YoungHo Park
  • Li Xu
چکیده

With the rapid development of the mobile communication and wireless access technologies, the interworking of heterogeneous networks turns into a trend and various wireless networks are getting connected with the mobile core networks through different measures. At present, in mobile communication, though access authentication methods of various access networks are different from each other, they are all based on the unique authentication algorithm in (U)SIM, which results in several drawbacks and cannot fulfill the requirements of the future mobile communications. The underlying reason is the authentication algorithm is not extensible and the authentication framework is not independent of the communication technologies. In order to solve this problem, we propose a uniform access authentication framework. Making use of the extensive authentication protocol EAP, we add a media-independent authentication layer in USIM which outputs the uniform keys after an authentication, and a key adaptation layer is designed in the terminals which transforms the output keys accordingly to meet the specific requirements of various communication modules. In such a method, USIM is extensible in authentication algorithms and the authentication framework is independent of the communication technologies. Our analysis indicates that the proposed scheme is of great advantages over the current one.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing USIM-based Mobile Communications from Interoperation of SIM-based Communications

Mobile networks security is constantly evolving and adapting to meet the needs of users and network operators. It is a requirement that there be interoperation of legacy security frameworks into modern mobile networks. Mobile networks originally had no real security which proved to be a deployment that was attacked constantly and the providers were defrauded of millions of dollars. To address t...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Analyzing Security of Korean USIM-Based PKI Certificate Service

This paper analyzes security of Korean USIM-based PKI certificate service. Korean PKI certificate consists of public key and password encrypted private key on disk. Due to insufficient security provided by single password, Korean mobile operators introduced USIM-based PKI system. We found several vulnerabilities inside the system, including private key’s RSA prime number leakage during certific...

متن کامل

Improving mobile authentication with new AAA protocols

The rapid growth of wireless technology and the increasing use of such technologies in coordination with the Internet demand a very careful look at issues related to security. As more and more users attempt to utilize such technologies in the context of providing security demanding services, it is essential to recognize the potential threats in wireless technologies. This paper focuses on authe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Wireless Comm. and Networking

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011