An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

نویسندگان

چکیده مقاله:

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two networks have complementary properties, some attempts are made for their integration which could lead to an advantageous heterogeneous network. In such a heterogeneous network, provision of services like authentication, billing and quality of service are essential. In this article, a new mutual authentication protocol, namely, Non-Reputation Billing Protocol (NRBP) is proposed based on extensible authentication protocols. This authentication scheme provides a non-repudiation property for the billing problem. The proposed scheme is analyzed based on different security features and computation overhead. In comparison with previous approaches, this protocol contains all the considered security parameters. Moreover, the computation overhead of this protocol is less than other schemes.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Non-repudiation Protocol

Fairness may be a desirable property of a nonrepudiation service. Protocols can achieve fairness through the involvement of a trusted third party but the extent of the trusted third party's involvement can vary between protocols. Hence, one of the goals of designing an efficient non-repudiation protocol is to reduce the work load of the trusted third party. In this paper we present a variant of...

متن کامل

Optimistic Non-repudiation Protocol Analysis

Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis me...

متن کامل

Efficient Cooperative Relaying in UMTS-WiMAX- WLAN Overlaid Heterogeneous Networks

Future wireless communication is expected to integrate collocated different radio access technologies together to meet wide expectation (multiple services) from users and to support mobility. The key requirements in this multiple radio access technology are to meet the Quality of Service (QoS) requirement of the user based on the service type, reduce energy consumption for the particular servic...

متن کامل

Accounting and billing of wireless internet services in 3G networks

The development of the wireless internet market and its structure is driven by differing industry fundamentals, and the revenue derived from content and content-related services is expected to increase significantly for all players within the wireless industry. Providing flexible and scalable accounting and billing systems will be essential for success when offering wireless services to end cus...

متن کامل

an efficient protocol for data aggregation in wireless sensor networks

sensor networks generally consist of a very great number of sensor nodes which will be spread into a vast environment and aggregate data out of it. the sensor nodes are afflicted with some limitations as follows memory, reception, communication as well as calculation capability, and battery power. the transmission of a great amount of extra data increases data transmission and proportionally in...

متن کامل

An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party

In this paper we consider a new and efficient optimistic nonrepudiation protocol. In a non-repudiation protocol, during which Alice wants to transmit a message to Bob, Alice has to send a non-repudiation of origin evidence to Bob (attesting that Alice is at the origin of the transmitted message), and Bob has to send a non-repudiation of receipt evidence to Alice (attesting Bob’s receipt of the ...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 6  شماره 2

صفحات  141- 153

تاریخ انتشار 2014-07-01

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023