Secure data transmission with cloud computing in heterogeneous wireless networks

In this paper, we propose a secure handoff scheme for data transmission in integration of 3G and 802.11 wireless local area networks (WLANs). The handoff between 802.11 WLAN and the 3G suffers from some drawbacks and has been hijacked through the middle of a communication session. We propose an architecture based on cloud computing to build our scheme to fix the problems in such heterogeneous wireless networks. Adaptive Key Exchange Protocol is proposed to protect data transmission as 3G users hand over to an 802.11 WLAN. The approach includes three phases, and all steps of each phase are protected by robust public-key encryption. Therefore, no information can be hijacked in such environment. The security analysis shows that data transmission between 802.11 WLAN and 3G is robust and secure in various aspects. Copyright © 2012 John Wiley & Sons, Ltd.

[1]  Muhammad Jaseemuddin An architecture for integrating UMTS and 802.11 WLAN networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[2]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[3]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[4]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[5]  Jari Arkko,et al.  Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA') , 2009, RFC.

[6]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[7]  Wen-Shenq Juang,et al.  Efficient 3GPP Authentication and Key Agreement with Robust User Privacy Protection , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[8]  Colin Boyd,et al.  Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , 1998, ACISP.

[9]  Yuguang Fang,et al.  Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..

[10]  Chunming Liu,et al.  An improved interworking architecture for UMTS-WLAN tight coupling , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[11]  Rajeev Koodli,et al.  Fast Handovers for Mobile IPv6 , 2001, RFC.

[12]  Chunming Liu,et al.  HCRAS: A novel hybrid internetworking architecture between WLAN and UMTS cellular networks , 2005, Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005.

[13]  Yen-Chieh Ouyang,et al.  A new security key exchange channel for 802.11 WLANs , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..

[14]  William A. Arbaugh,et al.  An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .

[15]  Henry Haverinen,et al.  Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) , 2006, RFC.

[16]  Melbourne Barton,et al.  Mobility management in integrated UMTS/WLAN networks , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[17]  Yan Zhang,et al.  Security Management in the Next Generation Wireless Networks , 2006, Int. J. Netw. Secur..

[18]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[19]  Georgios Kambourakis,et al.  Advanced SSL/TLS-based authentication for secure WLAN-3G interworking , 2004 .

[20]  Hyun-Ho Choi,et al.  A seamless handoff scheme for UMTS-WLAN interworking , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[21]  Seung-Jae Han,et al.  Integration of 802.11 and third-generation wireless data networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[22]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.