期刊文献+

基于EAP-TTLS的3G-WLAN融合网络认证方法 被引量:3

An EAP-TTLS Based 3G-WLAN Integrated Network Authentication Method
下载PDF
导出
摘要 在3GPP提出的3G与WLAN融合方案的基础上,针对EAP-AKA认证方法中存在的虚假AP攻击,用户私密信息泄露等安全问题,提出了一种EAP-TTLS-AKA认证方法。此方法实现了UE对WLAN接入网的认证,在UE和WLAN接入网之间建立了安全认证隧道,并在安全认证隧道中实现UE和3GPP的AKA认证。分析结果表明,此方法有效解决了虚假AP攻击、IMSI信息泄露、中间人攻击等安全问题,具有较高的安全性,同时也保持较低的通信和计算开销。 Based on the 3GPP's 3G and WLAN integration program and the false AP attack in the EAP-AKA as well as the user security issues such as disclosure of private information,an EAP-TTLS-AKA authentication method is presented.This method implements the establishment of the UE authentication of the WLAN access network.The AKA authentication of 3GPP and UE is achieved in the drying tunnels.The results show that this method is an effective solution to the false AP attack,IMSI information disclosure,middle attacks and other security issues.It has high security and maintains low communication and computation overhead.
作者 沈雷
出处 《电子科技》 2011年第3期108-111,共4页 Electronic Science and Technology
关键词 3GPP WLAN 认证 AKA EAP-TTLS 3GPP WLAN certification AKA EAP-TTLS
  • 相关文献

参考文献8

  • 13GPP Technical Specification. 3GPP system to Wireles Local Area Network (WLAN) Interworking: System Description [S]. USA: 3GPP TS 23. 234 version 7.6. 0 Release 7, 2008.
  • 23GPP Technical Specification. 5G Security; Wireless Local Area Network ( WLAN ) Interworking Security [ S ]. USA: 3GPP TS 33. 234 Version 7.5.0 Release 7, 2007.
  • 3Aboba B. Extensible Authentication Protocol (EAP) [ C ]. Indian: IETFRFC 3748, 2004.
  • 4Arkko J, Haverinen H. EAP - AKA Authentication [Z]. USA: RFC4187, 1999.
  • 5Funk P S, Blake Wilson. EAP Tunneled TLS Authentica- tion Protocol [ C ]. Japan : IETFRFC 3748, 2007.
  • 63GPP Technical Specification. Requirements on 3GPP System to Wireless Local Area Network (WLAN) Interworking [S]. USA: 3GPP TS 22. 234 Version 7.6.0 Release 7, 2007.
  • 73GPP Technical Specification. Feasibility Feasibility Study on 3GPP System to Wireles local Area Network(WLAN) In- terworking IS]. USA: 3GPP TR 22. 934 Version 7.0.0 Release 7, 2007.
  • 8Hyunuk Hwang. A Study on MITM (Man In The Middle) Vulnerability in Wireless Network Using 802. 1X and EAP [C]. England: International Conference on Information Science and Security, IEEE, 2008.

同被引文献34

  • 1史永贺,刘焕淋.基于3G/WLAN交互网络的认证方法改进[J].信息网络安全,2008(8):43-45. 被引量:5
  • 2张帆,马建峰.WAPI认证机制的性能和安全性分析[J].西安电子科技大学学报,2005,32(2):210-215. 被引量:29
  • 3Ferrus R,Sallent O,Agusti R.Interworking in heterogeneous wireless networks:comprehensive framework and future trends[J].Wireless Communications,IEEE,2010,17(2):22-31.
  • 4Hwang M S,Chong S K,Ou H H.On the security of an enhanced UMTS authentication and key agreement protocol[J].European Transactions on Telecommunications,2011,22(3):99-112.
  • 53GPP.TS 33.234 Wireless Local Network(WLAN) Interworking Security[S].Valbonne:3GPP,2005.
  • 6Tseng Y M.GPRS/UMTS aided authentication protocol for wireless LANs[J].IEE Proceedings-Communications,2006,153(6):810-817.
  • 7Ntantogian C,Xenakis C.One-pass EAP-AKA authentication in 3G-WLAN integrated networks[J].Wireless personal communications,2009,48(04):569-584.
  • 8Dankers J,Garefalakis T,Schaffelhofer R,et al.Public key infrastructure in mobile systems[J].Electronics & Communication engineering journal,2002,14(5):180-190.
  • 9Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//Advances in Cryptology-ASIACRYPT 2003.Springer Berlin Heidelberg,2003:452-473.
  • 10何清林,武传坤.3G-WLAN互联网络中一种新的快速重认证方案[J].计算机应用研究,2008,25(4):1123-1126. 被引量:2

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部