Abstract
Recent research efforts have been addressed towards maintain the heterogeneous networking transparent under the powerful all-IP concept. As example, current global standarization initiative specifies the 3G cellular system to wireless LAN inter-working. On the other hand, smart cards are presented as enough powerful devices capable to perform a strong authentication at lower layers of the protocol stack. Our work proposes a novel model reference and a scenario of applicability for secure electronic payment in this environment. Impact on the trust relations are assesed and a set of authentication requirements are provided. Finally, a new approach based on end-to-end layer 2 authentication protocols is adjusted to this proposal, considering the most interesting improvements in the authentication mechanisms applicable to this context.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
3GPP TS 23.234 v6.2.0: 3GPP system to Wireless Local Area Network (WLAN) Interworking; System Description (September 2004)
3GPP TS 33.234 v6.3.0; 3GPP system to Wireless Local Area Network (WLAN) Interworking Security System (December 2004)
Argyroudis, P.G., Verma, R., Tewari, H., O’Mahony, D.: Performance Analysis of Cryptographic Protocols on Handheld Devices. In: NCA 2004, pp. 169–174 (2004)
Gupta, V., Gupta, S.: Experiments in wireless internet security. In: Proc. IEEE Wireless Communications and Networking Conference, WCNC, vol. 1, pp. 859–863 (March 2002)
IST Project Brain. Broadband Radio Access for IP based Networks (IST-1999-10050) (2001)
IST Project Wine. Wireless Internet Networks. (IST-1999-10028) (2001)
3D –Secure Functional Specification. Chip Card Specification v1.0, Visa Corp. (August 2001)
IEEE Standard for Information technology, 802.11i-2004 Amendment to IEEE Std 802.11i/D7.0: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Specification for Enhanced Security (2004)
Kamborakis, G., Rouskas, A., Hormentzas, G., Gritzalis, S.: Advanced SSL/TLS-based authentication for secure WLAN-3G interworking. IEEE Proc. Communications 152(5) (October 2004)
Lagosanto, L.: Java Card evolution toward service-oriented architectures. In: Fifth e-Smart Conference, Sophia Antipolis, France (September 2004)
Shi, M., Shen, X., Mark, J.W.: IEEE802.11 Roaming and Authentication in Wireless LAN/cellular mobile networks. IEEE Wireless Communications (August 2004)
Salgarelli, L., Buddhikot, M., Garay, J., Patel, S., Miller, S.: Efficiency authentication and key distribution in wireless IP networks. IEEE Wireless Communications (December 2003)
WLAN Smart Card Consortium Specifications (September 2004), www.wlansmartcard.org
Urien, P., et al.: EAP Smart Card Protocol. IETF Internet Draft <draft-urien-eap-smartcard-type-00> (September 2004)
Haverinen, H., Salowey, J.: EAP-SIM Authentication. IETF Internet Draft <draft-haverinen-pppext-eap-sim-16> (December 2004)
Arkko, J., Haverinen, H.: EAP-AKA authentication, <draft-arkko-pppext-eap-aka-15> (December 2004)
Salkintzis, A.K.: Interworking techniques and architectures for WLAN/3G integration toward 4G mobile data networks. IEEE Wireless Communications 11(3), 50–61 (2004)
Salkintzis, A., Fors, C., Pazhyannur, R.S.: WLAN-GPRS Integrationfor Next Generation Mobile Data Networks. IEEE Wireless Communications 9(5), 112–124 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Torres, J., Izquierdo, A., Ribagorda, A., Alcaide, A. (2005). Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424857_80
Download citation
DOI: https://doi.org/10.1007/11424857_80
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25862-9
Online ISBN: 978-3-540-32045-6
eBook Packages: Computer ScienceComputer Science (R0)