SIM-based subscriber authentication mechanism for wireless local area networks
نویسندگان
چکیده
Authentication and roaming are two critical issues for the integration of heterogeneous networks, such as the integration of WLAN access networks and mobile cellular networks. Due to the strong points of mobile cellular networks, it is favorable to integrate the authentication mechanism ofWLAN access networks into that of mobile cellular networks. For GSM/GPRS networks, the subscriber identity module (SIM) card is used for user identification, authentication and message encryption. Therefore, it is feasible to authenticate the subscribers in WLAN via exchanging the authentication information between mobile cellular networks and subscribers’ SIM cards. In this work, the issue of the subscriber authentication for WLAN access networks is investigated. By integrating the authentication mechanism of WLAN into that of GSM/GPRS networks, a GSM/GPRS SIM-based authentication mechanism for WLAN as well as the related protocols is proposed. Furthermore, the implementation issues are well investigated, and an experimental system is implemented to verify the feasibility of this authentication mechanism. q 2005 Elsevier B.V. All rights reserved.
منابع مشابه
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملSIM Based WLAN Authentication for Open Platforms
2. Overview of GSM SIM Based Authentication This paper discusses approaches to authenticating users with open platforms, such as notebook PCs, for WLAN access using SIM cards. Using SIM cards to authenticate WLAN access is desirable by wireless operators as this approach minimizes additional infrastructure investments since the existing authentication processes and equipment are re-used. This p...
متن کاملTransparent End-User Authentication Across Heterogeneous Wireless Networks
With the increasing number of mobile and wireless networks that are deployed, the handovers between these systems take place more often. In order to provide end-users with uninterrupted access to services, support for fast handover is essential. One of the prerequisites of a fast-handover is transparent end-user authentication. In this paper we address end-user authentication at network level. ...
متن کاملA new SDN-based framework for wireless local area networks
Nowadays wireless networks are becoming important in personal and public communication andgrowing very rapidly. Similarly, Software Dened Network (SDN) is an emerging approach to over-come challenges of traditional networks. In this paper, a new SDN-based framework is proposedto ne-grained control of 802.11 Wireless LANs. This work describes the benets of programmableAcc...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Communications
دوره 29 شماره
صفحات -
تاریخ انتشار 2006