Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens

The development of mobile devices (CPU, memory, and storage) and the introduction of mobile networks (Ad-Hoc, Wi-Fi, WiMAX, and 3.5G) have opened new opportunities for next generation of mobile services. It becomes more convenience and desirable for mobile internet users to be connected everywhere. However, ubiquitous mobile access connectivity faces interoperation issues between wireless network providers and wireless network technologies. Although mobile users would like to get as many services as possible while they travel, there is a lack of technology to identify visited users in current foreign network authentication systems. This challenge lies in the fact that a foreign network provider does not initially have the authentication credentials of a mobile user. Existing approaches use roaming agreement to exchange authentication information between home network and foreign network. This paper proposes a roaming agreement-less approach designed based on our ubiquitous mobile access model. Our approach consist of two tokens, Passport (identification token) and Visa (authorisation token) to provide the mobile user with a flexible authentication method to access foreign network services. The security analysis indicates that our proposal is more suitable for ubiquitous mobile communication especially in roaming agreement-less environment.

[1]  Colin Boyd,et al.  On a Limitation of BAN Logic , 1994, EUROCRYPT.

[2]  Chin-Ling Chen,et al.  A Mobile Ticket System Based on Personal Trusted Device , 2007, Wirel. Pers. Commun..

[3]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[4]  John T. Kohl,et al.  The Evolution of the Kerberos Authentication Service , 1992 .

[5]  Claudia Keser,et al.  Can We Manage Trust? , 2005, iTrust.

[6]  Rebecca N. Wright,et al.  Off-Line Generation of Limited-Use Credit Card Numbers , 2001, Financial Cryptography.

[7]  William A. Arbaugh,et al.  AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks , 2007, ATC.

[8]  Yanchun Zhang,et al.  A Global Ticket-Based Access Scheme for Mobile Users , 2004, Inf. Syst. Frontiers.

[9]  Sulabh Agarwal,et al.  MoB: a mobile bazaar for wide-area wireless services , 2005, MobiCom '05.

[10]  Ivan Ganchev,et al.  Toward a ubiquitous consumer wireless world , 2007, IEEE Wireless Communications.

[11]  William A. Arbaugh,et al.  Wireless Network Security and Interworking , 2006, Proceedings of the IEEE.

[12]  Yanchun Zhang,et al.  Achieving secure and flexible M-services through tickets , 2003, IEEE Trans. Syst. Man Cybern. Part A.

[13]  Randy H. Katz,et al.  Secure Authentication System for Public WLAN Roaming , 2003, WMASH '03.

[14]  Paramvir Bahl,et al.  Secure wireless Internet access in public places , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[15]  Ning Wang,et al.  Consumer-Oriented Incoming Call Connection Service for a Ubiquitous Consumer Wireless World , 2009, Wirel. Pers. Commun..

[16]  Bala Srinivasan,et al.  A Limited-Used Key Generation Scheme for Internet Transactions , 2004, WISA.

[17]  Sulabh Agarwal,et al.  A mobile bazaar for wide-area wireless services , 2005, MobiCom '05.

[18]  Jerome H. Saltzer,et al.  Kerberos authentication and authorization system , 1987 .

[19]  Kutila Gunasekera,et al.  Comparative Efficiency and Implementation Issues of Itinerant Agent Language on Different Agent Platforms , 2008 .

[20]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[21]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[22]  Levente Buttyán,et al.  Accountable anonymous access to services in mobile communication systems , 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.

[23]  I. Ganchev,et al.  Strategic innovations through NGN standardisation for a Ubiquitous Consumer Wireless World , 2008, 2008 First ITU-T Kaleidoscope Academic Conference - Innovations in NGN: Future Network and Services.

[24]  Olivier Bonaventure,et al.  Authenticated wireless roaming via tunnels: making mobile guests feel at home , 2009, ASIACCS '09.

[25]  Jon Crowcroft,et al.  Architecting Citywide Ubiquitous Wi-Fi Access , 2007, HotNets.

[26]  Sini Ruohomaa,et al.  Trust management for inter-enterprise collaborations , 2007 .

[27]  William A. Arbaugh,et al.  The Design of Efficient Internetwork Authentication for Ubiquitous Wireless Communications , 2006 .

[28]  Jinli Cao,et al.  Ticket-Based Service Access Scheme for Mobile Users , 2002, ACSC.

[29]  Xianping Wu,et al.  Dynamic Keys Based Sensitive Information System , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[30]  Alejandro Quintero,et al.  Mobile services access and payment through reusable tickets , 2009, Comput. Commun..

[31]  Jon Crowcroft,et al.  Ticket based service access for the mobile user , 1997, MobiCom '97.

[32]  Randy H. Katz,et al.  Secure Authentication System for Public WLAN Roaming , 2005, Mob. Networks Appl..

[33]  Xuemin Shen,et al.  A Service-Agent-Based Roaming Architecture for WLAN/Cellular Integrated Networks , 2007, IEEE Transactions on Vehicular Technology.

[34]  Chetan Sharma,et al.  Always Best Connected , 2008 .

[35]  Ian F. Akyildiz,et al.  A ubiquitous mobile communication architecture for next-generation heterogeneous wireless systems , 2005, IEEE Communications Magazine.

[36]  James B. D. Joshi,et al.  Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[37]  Hua Wang,et al.  Ticket-based mobile commerce system and its implementation , 2006, Q2SWinet '06.

[38]  Tai-Yun Kim,et al.  Ticket based authentication and payment protocol for mobile telecommunications systems , 2001, Proceedings 2001 Pacific Rim International Symposium on Dependable Computing.