An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

Authors

Abstract:

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two networks have complementary properties, some attempts are made for their integration which could lead to an advantageous heterogeneous network. In such a heterogeneous network, provision of services like authentication, billing and quality of service are essential. In this article, a new mutual authentication protocol, namely, Non-Reputation Billing Protocol (NRBP) is proposed based on extensible authentication protocols. This authentication scheme provides a non-repudiation property for the billing problem. The proposed scheme is analyzed based on different security features and computation overhead. In comparison with previous approaches, this protocol contains all the considered security parameters. Moreover, the computation overhead of this protocol is less than other schemes.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

An Efficient Non-repudiation Protocol

Fairness may be a desirable property of a nonrepudiation service. Protocols can achieve fairness through the involvement of a trusted third party but the extent of the trusted third party's involvement can vary between protocols. Hence, one of the goals of designing an efficient non-repudiation protocol is to reduce the work load of the trusted third party. In this paper we present a variant of...

full text

Optimistic Non-repudiation Protocol Analysis

Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis me...

full text

Efficient Cooperative Relaying in UMTS-WiMAX- WLAN Overlaid Heterogeneous Networks

Future wireless communication is expected to integrate collocated different radio access technologies together to meet wide expectation (multiple services) from users and to support mobility. The key requirements in this multiple radio access technology are to meet the Quality of Service (QoS) requirement of the user based on the service type, reduce energy consumption for the particular servic...

full text

Accounting and billing of wireless internet services in 3G networks

The development of the wireless internet market and its structure is driven by differing industry fundamentals, and the revenue derived from content and content-related services is expected to increase significantly for all players within the wireless industry. Providing flexible and scalable accounting and billing systems will be essential for success when offering wireless services to end cus...

full text

an efficient protocol for data aggregation in wireless sensor networks

sensor networks generally consist of a very great number of sensor nodes which will be spread into a vast environment and aggregate data out of it. the sensor nodes are afflicted with some limitations as follows memory, reception, communication as well as calculation capability, and battery power. the transmission of a great amount of extra data increases data transmission and proportionally in...

full text

An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party

In this paper we consider a new and efficient optimistic nonrepudiation protocol. In a non-repudiation protocol, during which Alice wants to transmit a message to Bob, Alice has to send a non-repudiation of origin evidence to Bob (attesting that Alice is at the origin of the transmitted message), and Bob has to send a non-repudiation of receipt evidence to Alice (attesting Bob’s receipt of the ...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 6  issue 2

pages  141- 153

publication date 2014-07-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023