Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks
نویسندگان
چکیده
Certificate based authentication of parties provides a powerful means for verifying claimed identities, avoiding the necessity of distributing shared secrets beforehand. Whereas Wi-Fi networks present security deficiencies, they manage to highly penetrate into the wireless market in a great degree due to their low cost, easy administration, great capacity, IP-oriented nature, etc. Considering Wi-Fi networking settings, administrated by different operators, as parts of a common core 3G infrastructure, the paper proposes and evaluates the potential application of enhanced TLS-based authentication mechanisms in integrated emerging-3G and Wi-Fi networks. We propose to use EAP-TLS protocol seconded by Public Key Infrastructure entities, to provide users with robust authentication mechanisms in hybrid WLAN-3G heterogeneous environment. Our alternative solution is discussed against EAP-AKA procedures as they appear in the latest 3G and integrated 3G/Wi-Fi specifications. Finally, the proposed mechanism is evaluated through a properly designed experimental test bed setup.
منابع مشابه
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملAn Implementation of Wi-Fi using SIM Based Authentication
This paper deals with the implementation of the term “SIM based Wi-Fi Authentication” describes the process of authenticating mobile device such as cellular phone, tablet etc. automatically to the Wi-Fi network, without the need for separate credentials, such as username and password as in case of WPA/WPA2 based networks. This procedure helps in providing a unified mechanism to use SIM credenti...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملVOUCH-AP: priVacy preserving Open-access 802.11 pUbliC Hotspot AP authentication mechanism with co-located evil-twins
Open-access 802.11 public Wi-Fi hotspots have become a basic necessity for hundreds of millions of mobile users’ persistent on-the-go access to the Internet. 802.11 Wi-Fi networks are designed and deployed to support rudimentary low-level authentication at the link layer enabling an AP to decide whether to allow a client to associate. Similar authentication mechanisms are not provisioned for th...
متن کاملA pricing model of GPRS networks with WI-FI integration for "heavy" data users
As wireless services have become increasingly integrated and their demand is mounting, Wi-Fi provides an appealing opportunity for the GSM/GPRS operators to enhance their data capability. By integrating both networks, operators are able to provide 3G-like services. However, both networks have different data rates and capacity, which makes pricing a challenging issue. In this paper we propose a ...
متن کامل