Skip to main content
Log in

A Robust Authentication Protocol with Non-Repudiation Service for Integrating WLAN and 3G Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The third-generation cellular systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems suffer the high installation cost and low bandwidth. Though WLAN provides hot spot coverage with high data rates, it lacks roaming and mobility support. From users' points of views, the integration of WLAN and 3G systems is an attractive way that will provide them a convenient access to network. When integrating WLAN and 3G, there are still some problems should be concerned in terms of authentication and security, such as authentication efficiency and repudiation problem. In this paper, we review the authentication scheme for WLAN and 3G/UMTS interworking which is specified by 3GPP and propose a robust localized fast authentication protocol with non-repudiation service for integrating WLAN and 3G network. The localized re-authentication protocol can shorten the authentication time delay. On the other hand, with the non-repudiation service, the assumption, that subscriber has to fully trust 3G home operator, can be deleted and the trust management between the independent WLAN operator, 3G visited operator and 3G home operator can be eliminated. In other words, our proposed protocol provides legal evidences to prevent the 3G home operator from overcharge toward the subscriber and also prevent the WLAN operator and 3G visited operator from overcharge toward the 3G home operator. The authentication protocol employs HMAC, hash-chaining techniques, and public-key digital signature to achieve localized fast re-authentication and non-repudiation service.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. 3GPP, Tech. Spec. Services and System Aspects, “3G Security; Wireless Local Area Network (WLAN) Interworking Security (Release 6)”, Tech. Spec. 3G TS 33.234 v6.0.0, (2004–03), 2004.

  2. G.M. Koien and T. Haslestad, “Security Aspects of 3G-WLAN Interworking”, IEEE Communications Magazine, pp. 82–88, Nov. 2003.

  3. Y.-M. Tseng, C.-C. Yang, and J.-H. Su, “An Efficient Authentication Protocol for Integrating WLAN and Cellular Networks”, Advanced Communication Technology, The 6th International Conference on, Vol. 1, pp. 416–420, 2004.

    Article  Google Scholar 

  4. G. Kambourakis, A. Rouskas, G. Kormentzas, and S. Gritzalis, “Advanced SSL/TLS-based authentication for secure WLAN-3G interworking”, Communications, IEE Proceedings, Vol. 151, pp. 501–506, Oct. 2004.

    Article  Google Scholar 

  5. L. Harn and W.-J. Hsin, “On the Security of Wireless Network Access with Enhancements”, in Proceedings of the 2003 ACM Workshop on Wireless Security, pp. 88–95.

  6. H.Y. Lin and L. Harn, “Authentication Protocols with Nonrepudiation Services in Personal Communication Systems”, IEEE Communications Letters, Vol. 3, No. 8, pp. 236–238, 1999.

    Article  Google Scholar 

  7. L. Lamport, “Password Authentication with Insecure Communication”, Communication of ACM, Vol. 24, No. 11, pp. 770–772, 1981.

    Article  Google Scholar 

  8. NIST FIPS PUB 186-1, Digital Signature Standard (DSS), Dec. 15, 1998.

  9. 3GPP, Tech. Spec. Group, Service and System Aspects, “3GPPP System to Wireless Local Area Network (WLAN) Interworking; System Description (Release 6)”, Tech. Spec. 3G TS 23.234 v. 6.1.0 (2004–06), 2004.

  10. J. Arkko and H. Haverinen, “Extensible Authentication Protocol Method for UMTS Authentication and Key Agreement (EAP-AKA)”, draft-arkko-pppext-eap-aka-14, IETF, Nov. 2004.

  11. C. de Laat, G. Gross, L. Gommans, J. Vollbrecht, and D. Spence, “Generic AAA Architecture”, RFC 2903, IETF, Aug. 2000.

  12. L. Blunk and J. Vollbrecht, “PPP Extensible Authentication Protocol (EAP)”, RFC 2284, IETF, Mar. 1998.

  13. “Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) specifications”, ANSI/IEEE Std. 802.11:1999 (E) Part 11, ISO/IEC 880211, 1999.

  14. IEEE Std 802.11i/D7.0, October 2003: “Draft Supplement to Standard for Telecommunications and Information Exchange Between Systems — LAN/MAN Specific Requirements-Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Specification for Enhanced Security”.

  15. IEEE Std, 802.1X-2001, “IEEE Standard for Local an Metropolitan Area Networks — Port-Based Network Access Control”, July 2001.

  16. H. Haverinen and J. Salowey, “EAP-SIM Authentication”.: <draft-haverinen-pppext-eap-sim-15.txt>, November 2004.

  17. IETF RFC 2716, October 1999: “PPP EAP TLS Authentication Protocol”.

  18. P. Funk, “EAP MD5 Authentication,” <draft-funk-eap-md5-tunneled-00.txt> Mar. 2003.

  19. RFC 2486, January 1999: “The Network Access Identifier”.

  20. “The Keyed-Hash Message Authentication Code (HMAC)”. Federal Information Processing Standards Publication. Draft. 2001.

  21. J. Korhonen, Introduction to 3G Mobile Communications. Artech House, 2003.

  22. 3GPP, Tech. Spec. Group, Service and System Aspects, “Feasibility Study on 3GPP system to Wireless Local Area (WLAN) interworking (Release 6)”, Tech. Spec. 3G TS 22.934 v. 6.2.0 (2003–09), 2003.

  23. 3GPP, Tech. Spec. Group, Svcs. and Sys. Aspects, “General Packet Radio Service (GPRS); Service Description”, Tech. Spec. 3G TS 23.060 v. 6.0.0 (2004–09), 2004.

  24. H. Holma and A. Toskala, (eds.), WCDMA for UMTS. Wiley, 2000.

  25. 3GPP, Tech. Spec. Group, Core Network, “GPRS Tunneling Protocol (GTP) across the Gn and Gp Interface,” Tech. Spec. 3G TS 29.060 v. 6.6.0 (2004–09), 2004.

  26. RFC 2865, June 2000: “Remote Authentication Dial In User Service (RADIUS)”.

  27. RFC 3588, September 2003: “Diameter Base Protocol”

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chou-Chen Yang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yang, CC., Yang, YW. & Liu, WT. A Robust Authentication Protocol with Non-Repudiation Service for Integrating WLAN and 3G Network. Wireless Pers Commun 39, 229–251 (2006). https://doi.org/10.1007/s11277-006-9090-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-006-9090-1

Keywords

Navigation