Authentication and Billing Protocols for the Integration of WLAN and 3G Networks

Wireless communications have developed rapidly and have been applied for many services. Cellular (the third-generation) mobile networks and wireless local area network (WLAN) are two important technologies for providing wireless communications. The third-generation (3G) networks provide wider service areas, and “always-o” and ubiquitous connectivity with low-speed data rate. WLAN networks offer higher data rate and the easy compatibility of wired Internet, but cover smaller areas. In fact, 3G and WLAN possess complementary properties. Integrating 3G and WLAN networks may offer subscribers high-speed wireless data services and ubiquitous connectivity. For integrating two heterogeneous networks, several issues should be involved, authentication, billing, quality of service, and seamless roaming between 3G and WLAN networks. In this paper, we address the authentication and billing problems and propose two protocols that provide both authentication and billing services. One protocol utilizes a one-time password approach to authenticate subscribers. This protocol is efficient in both computation time and authentication procedures. Because of the restrictions of the password-based approach, this protocol could not offer the non-repudiation property for the billing problem. Another protocol is constructed on a public-key-based system (i.e., certificates). Although it requires more computation time than the password-based approach, non-repudiation is guaranteed. Performance analysis simulation results are given to validate our two protocols.

[1]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[2]  Huseyin Selcuk Ozturk,et al.  Evaluation of Secure 802.1X Port-Based Network Access Authentication Over 802.11 Wireless Local Area Networks , 2003 .

[3]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[4]  R. Venkateswaran,et al.  Virtual Private Networks , 2003, Hands on Hacking.

[5]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[6]  Lein Harn,et al.  Authentication protocols with nonrepudiation services in personal communication systems , 1999, IEEE Communications Letters.

[7]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[8]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[9]  Leon Gommans,et al.  Generic AAA Architecture , 2000, RFC.

[10]  Kyung-Ah Shim Cryptanalysis of mutual authentication and key exchange for low power wireless communications , 2003, IEEE Communications Letters.

[11]  Reuven Cohen,et al.  On the cost of virtual private networks , 2000, TNET.

[12]  Tai-Yun Kim,et al.  Temporary Mobile User Certificate for Mobile Information Services in UMTS (Special Issue on Personal, Indoor and Mobile Radio Communications) , 2000 .

[13]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[14]  Yuh-Min Tseng Robust generalized MQV key agreement protocol without using one-way hash functions , 2002, Comput. Stand. Interfaces.

[15]  Hung-Yu Chien,et al.  On the Security of Methods for Protecting Password Transmission , 2001, Informatica.

[16]  Seung-Jae Han,et al.  Integration of 802.11 and third-generation wireless data networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[17]  CORPORATE NIST The digital signature standard , 1992, CACM.

[18]  N. K. Shankaranarayanan,et al.  Integrating wireless LAN and cellular data for the enterprise , 2003, IEEE Internet Computing.

[19]  Roland Schmitz,et al.  Secure interoperation between 2G and 3G mobile radio networks , 2000 .

[20]  Jouni Mikkonen,et al.  Wireless LAN access network architecture for mobile operators , 2001 .

[21]  Simon Blake-Wilson,et al.  EAP Tunneled TLS Authentication Protocol (EAP-TTLS) , 2004 .

[22]  Iakovos S. Venieris,et al.  Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration , 2003, Mob. Networks Appl..

[23]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.