Skip to main content

A TNC Protocol for 3GPP-WLAN Integrated Environment

  • Conference paper
Book cover Information Computing and Applications (ICICA 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 308))

Included in the following conference series:

  • 1507 Accesses

Abstract

The incorporation of The Third Generation (3G) networks with Wireless Local Area Networks (WLAN) is an inevitable outcome of mobile communication and wireless network development, and provides high quality services and anywhere-anytime connectivity to mobile users. To provide secure and trusted 3G-WLAN network, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is now used. However, EAP-AKA have several vulnerabilities, which can induce security threaten and lower efficiency of 3G-WLAN. Therefore, this paper analyzes vulnerabilities of EAP-AKA firstly, and proposes a new authentication and key agreement protocol based on certificateless public key cryptography in Trusted Network Connect (TNC) architecture. The proposed protocol combines D-H key exchange algorithm to overcome several vulnerabilities and provides strong security mutual-authentication between requestor and responder. Compared with other protocols based on public key cryptosystem with certificates, our protocol can also provide lightweight bandwidth consumption and high-level security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 3 Generation Partnership Project (3GPP), http://www.3gpp.org

  2. IETF RTC 3748, Extensible Authentication Protocol (EAP). Draft-arkko-pppext-eap-aka-12: Extensible Authentication Protocol Method for UMTS Authentication and Key Agreement (EAP-AKA) (April 2004)

    Google Scholar 

  3. TCG Specification Trusted Network Connect-TNC Architecture for Interoperability Revision 1.4 (2009)

    Google Scholar 

  4. Zhang, Y., Wang, Z.: Improved method of enhancing EAP-AKA protocol security. Computer Engineering and Applications, 96–98 (2009)

    Google Scholar 

  5. Liu, H., Shi, Q.-H.: EAP-AKA protocol with robust user privacy protection. Computer Engineering and Design, 2875–2881 (2009)

    Google Scholar 

  6. Liu, Y., Fan, K.-F., Zhang, S.-B., Mo, W., Shen, Y.-L.: Improved Authentication Protocol for WLAN2 3G Interworking Networks. Chinese Journal of Electronics, 309–404 (2010)

    Google Scholar 

  7. Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ma, J., Guo, Y. (2012). A TNC Protocol for 3GPP-WLAN Integrated Environment. In: Liu, C., Wang, L., Yang, A. (eds) Information Computing and Applications. ICICA 2012. Communications in Computer and Information Science, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34041-3_90

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34041-3_90

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34040-6

  • Online ISBN: 978-3-642-34041-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics