Securing Virtual Private Networks with SIM Authentication

被引:0
|
作者
Bjornstad, Torstein [1 ]
Jorstad, Ivar [2 ]
Do Van Thanh [1 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
[2] Ubisafe, Lillehammer, Norway
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever increasing amount of systems requiring user authentication, users are experiencing a substantial inconvenience. A huge amount of passwords needs to be remembered, which in many cases decrease system security, as users choose to write them down or use the same password for several systems. The number of username/password pairs has simply become unmanageable. Other, stronger authentication mechanisms are added to some systems, which increase administration costs for the enterprises/service providers. There is an immediate need for a stronger, yet at the same time simpler and cost-efficient authentication mechanism which can be reused across many different types of services. This paper proposes a novel VPN solution which employs the GSM SIM authentication mechanism for authenticating users towards VPN networks and for setting up the encrypted tunnel between the VPN client and server. The solution ensures strong security, is user-friendly and cost-efficient.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Virtual authentication ring for securing network operations
    Li, Na
    Lee, David
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 323 - 335
  • [2] An Authentication Framework for Securing Virtual Machine Migration
    Majhi, Santosh Kumar
    Dhal, Sunil Kumar
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1283 - 1286
  • [3] Authentication in virtual private networks based on quantum key distribution methods
    Niemiec, Marcin
    Machnik, Petr
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (17) : 10691 - 10707
  • [4] Authentication in virtual private networks based on quantum key distribution methods
    Marcin Niemiec
    Petr Machnik
    Multimedia Tools and Applications, 2016, 75 : 10691 - 10707
  • [5] Method of selecting the optimal structure of a distributed authentication system in virtual private networks
    Alguliev, RM
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 1999, 33 (03) : 12 - 21
  • [6] Virtual private networks
    Sharma, Vishal
    Ghani, Nasir
    Fang, Luyuan
    IEEE COMMUNICATIONS MAGAZINE, 2007, 45 (04) : 24 - 25
  • [7] Securing authentication and privacy in ad hoc partitioned networks
    Kaliaperumal, S
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 354 - 357
  • [8] XNetMon: A Network Monitor for Securing Virtual Networks
    Fernandes, Natalia Castro
    Muniz Bandeira Duarte, Otto Carlos
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [9] Securing wargames system using effective virtual private network
    Sobh T.S.
    Khalil A.H.
    Recent Patents on Computer Science, 2018, 11 (04) : 289 - 301
  • [10] Securing virtual private LAN service by efficient key management
    Liyanage, Madhusanka
    Gurtov, Andrei
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (01) : 1 - 13