Building up Trusted Identity Management in Mobile Heterogeneous Environment

Mobile Internet enables mobile users to access Internet services through mobile networks. Currently, cellular networks are converging with various wireless networks, e.g., WLAN, MANET, which forms a heterogeneous mobile environment. In such environment, it has been a big challenge for mobile operators and mobile service providers to offer seamless roaming and services among the networks. Previous work on solving the problem falls in specific network circumstance, which cannot be easily and widely applied in the heterogeneous environment. In this paper, we foresee the future of mobile networks into mobile cloud environment. Thus, we propose a generic and flexible solution based on cloud computing technology that can achieve various benefits, such as robustness, high availability, and so on. We present the architecture and procedures for building up the trusted identity management to achieve seamless roaming.

[1]  Randy H. Katz,et al.  Secure Authentication System for Public WLAN Roaming , 2005, Mob. Networks Appl..

[2]  Timo Smura Roaming considerations for the Finnish public WLAN market , 2004 .

[3]  Xuemin Shen,et al.  A Service-Agent-Based Roaming Architecture for WLAN/Cellular Integrated Networks , 2007, IEEE Transactions on Vehicular Technology.

[4]  Randy H. Katz,et al.  Secure Authentication System for Public WLAN Roaming , 2003, WMASH '03.

[5]  Qian Zhang,et al.  A seamless and proactive end-to-end mobility solution for roaming across heterogeneous wireless networks , 2004, IEEE Journal on Selected Areas in Communications.

[6]  Kyunghan Lee,et al.  Mobile Data Offloading: How Much Can WiFi Deliver? , 2013, IEEE/ACM Transactions on Networking.

[7]  Zheng Yan,et al.  A QoS-aware system for mobile cloud computing , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[8]  Jarmo Harju,et al.  Utilising eduroamTM architecture in building wireless community networks , 2008 .

[9]  Pin-Han Ho,et al.  Two-Factor Localized Authentication Scheme for WLAN Roaming , 2007, 2007 IEEE International Conference on Communications.

[10]  Chong-Ho Choi,et al.  SHARE: seamless handover architecture for 3G-WLAN roaming environment , 2009, Wirel. Networks.

[11]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.