An efficient authentication protocol for integrating WLAN and cellular networks

Cellular (3G or 2.5G) networks provide wider service areas and ubiquitous connectivity with low data rates. WLAN networks offer higher data rates and the easy compatibility of wired Internet, but cover smaller areas. 3G and WLAN possess complementary properties. Integrating 3G and WLAN networks may offer subscribers high-speed wireless data services and ubiquitous connectivity. For integrating two different networks, there are several problems should be concerned, such as authentication, billing, quality of service, and seamless roaming between 3G and WLAN networks. In this paper, we address the authentication problem and propose an efficient authentication protocol to let 3G subscribers can connect WLAN with higher data rate. Certainly, the protocol is also suitable for 2.5G. The authentication protocol utilizes a one-time password approach to authenticate subscribers. It can withstand guessing, replay and impersonation attacks. A simulation result is given to validate our protocol.

[1]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[2]  N. K. Shankaranarayanan,et al.  Integrating wireless LAN and cellular data for the enterprise , 2003, IEEE Internet Computing.

[3]  Lein Harn,et al.  Authentication protocols with nonrepudiation services in personal communication systems , 1999, IEEE Communications Letters.

[4]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[5]  Roland Schmitz,et al.  Secure interoperation between 2G and 3G mobile radio networks , 2000 .

[6]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[7]  Kyung-Ah Shim Cryptanalysis of mutual authentication and key exchange for low power wireless communications , 2003, IEEE Communications Letters.

[8]  Hung-Yu Chien,et al.  On the Security of Methods for Protecting Password Transmission , 2001, Informatica.

[9]  Seung-Jae Han,et al.  Integration of 802.11 and third-generation wireless data networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[10]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[11]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[12]  Leon Gommans,et al.  Generic AAA Architecture , 2000, RFC.

[13]  Yuh-Min Tseng Robust generalized MQV key agreement protocol without using one-way hash functions , 2002, Comput. Stand. Interfaces.

[14]  Jouni Mikkonen,et al.  Wireless LAN access network architecture for mobile operators , 2001 .

[15]  Iakovos S. Venieris,et al.  Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration , 2003, Mob. Networks Appl..

[16]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.