Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network

The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is developing, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible authentication protocol-authentication and key agreement (EAP-AKA) is used. However, EAP-AKA have several vulnerabilities. Therefore, this paper not only analyses the threats and attacks in 3G-WLAN interworking but also proposes a new authentication and key agreement protocol based on EAP-AKA. The proposed protocol combines elliptic curve Diffie-Hellman (ECDH) with symmetric key cryptosystem to overcome the vulnerabilities. The proposed protocol is used in hybrid coupled 3G-WLAN convergence network to analyse its efficiency in terms of QoS metrics, the results obtained using OPNET 14.5 shows that the proposed protocol outperforms existing interworking protocols both in security and QoS.

[1]  Geir M. Køien,et al.  Security aspects of 3G-WLAN interworking , 2003, IEEE Commun. Mag..

[2]  Wei-Kuan Shih,et al.  Practical considerations on end-to-end cellular/PWLAN architecture in support of bilateral roaming , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[3]  Simon Blake-Wilson,et al.  EAP Tunneled TLS Authentication Protocol (EAP-TTLS) , 2004 .

[4]  Kwangjo Kim,et al.  3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA , 2009, 2009 Wireless Telecommunications Symposium.

[5]  Kalle Ahmavaara,et al.  Interworking architecture between 3GPP and WLAN systems , 2003, IEEE Commun. Mag..

[6]  P. V. G. D. Prasad Reddy,et al.  Modified Queue-Based Exponential Rule Scheduler for Improved QOS in OFDMA Systems , 2010 .

[7]  ABBAS JAMALIPOUR,et al.  Network selection in an integrated wireless LAN and UMTS environment using mathematical modeling and computing techniques , 2005, IEEE Wireless Communications.

[8]  J Arkko,et al.  Network Working Group Extensible Authentication Protocol Method for Umts Authentication and Key Agreement (eap-aka) , 2004 .

[9]  Nokia,et al.  Network Working Group Extensible Authentication Protocol Method for Gsm Subscriber Identity Modules (eap-sim) , 2004 .

[10]  Apostolis K. Salkintzis,et al.  WLAN-GPRS integration for next-generation mobile data networks , 2002, IEEE Wirel. Commun..

[11]  Yuh-Min Tseng USIM-based EAP-TLS authentication protocol for wireless local area networks , 2009, Comput. Stand. Interfaces.

[12]  Lei Han,et al.  A Threat Analysis of The Extensible Authentication Protocol , 2006 .

[13]  Henry Haverinen,et al.  Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) , 2006, RFC.

[14]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[15]  Chunming Liu,et al.  An improved interworking architecture for UMTS-WLAN tight coupling , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[16]  Jari Arkko,et al.  Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA') , 2009, RFC.