Securing Virtual Private Networks with SIM Authentication

被引:0
|
作者
Bjornstad, Torstein [1 ]
Jorstad, Ivar [2 ]
Do Van Thanh [1 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
[2] Ubisafe, Lillehammer, Norway
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever increasing amount of systems requiring user authentication, users are experiencing a substantial inconvenience. A huge amount of passwords needs to be remembered, which in many cases decrease system security, as users choose to write them down or use the same password for several systems. The number of username/password pairs has simply become unmanageable. Other, stronger authentication mechanisms are added to some systems, which increase administration costs for the enterprises/service providers. There is an immediate need for a stronger, yet at the same time simpler and cost-efficient authentication mechanism which can be reused across many different types of services. This paper proposes a novel VPN solution which employs the GSM SIM authentication mechanism for authenticating users towards VPN networks and for setting up the encrypted tunnel between the VPN client and server. The solution ensures strong security, is user-friendly and cost-efficient.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks
    Luis Sánchez
    Jorge Lanza
    Luis Muñoz
    Kimmo Ahola
    Mikko Alutoin
    Wireless Personal Communications, 2010, 52 : 393 - 409
  • [22] External Authentication Approach for Virtual Private Network using LDAP
    Shrivastava, Anupriya
    Rizvi, M. A.
    2014 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & SOFT COMPUTING (ICNSC), 2014, : 50 - 54
  • [23] Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks
    Sanchez, Luis
    Lanza, Jorge
    Munoz, Luis
    Ahola, Kimmo
    Alutoin, Mikko
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 52 (02) : 393 - 409
  • [24] Integrity for virtual private routed networks
    Bush, R
    Griffin, TG
    IEEE INFOCOM 2003: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2003, : 1467 - 1476
  • [25] Virtual private networks - how they work
    Younglove, R
    COMPUTING & CONTROL ENGINEERING JOURNAL, 2000, 11 (06): : 260 - 262
  • [26] Future of virtual private networks (VPN)
    Bajenesco, T.I.
    Technische Mitteilungen (Schweizerische Post-, Telephon- und Telegraphenbetriebe), 73 (07):
  • [27] New economical virtual private networks
    Ben-Ameur, W
    Kerivin, H
    COMMUNICATIONS OF THE ACM, 2003, 46 (06) : 69 - 73
  • [28] Virtual private networks simplify communications
    Bellm, M
    CONTROL ENGINEERING, 1998, 45 (06) : 50 - 50
  • [29] Mobile IP and virtual private networks
    Bhagavathula, R
    Thanthry, N
    Pendse, R
    IEEE 56TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2002, VOLS 1-4, PROCEEDINGS, 2002, : 2414 - 2418
  • [30] Resource management for virtual private networks
    Raghunath, Satish
    Ramakrishnan, K. K.
    IEEE COMMUNICATIONS MAGAZINE, 2007, 45 (04) : 38 - 44