Imroved authentication for IMS registration in 3G/WLAN interworking

被引:0
|
作者
Celentano, D. [1 ]
Fresa, A. [1 ]
Longo, M. [2 ]
Robustelli, A. L. [1 ]
机构
[1] CoRiTel Italy, Via Ponte Don Melillo, I-84084 Fisciano, Italy
[2] Univ Salerno, DIIIE, I-84084 Fisciano, SA, Italy
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The present paper on WLAN-3G interworking focuses on how to guarantee secure access while minimising the authentication message overhead among User Equipment (UE), Access Network (AN) and Home Network. 3GPP (3(rd) Generation Partnership Project)[1], the main organization investigating B3G (Beyond-3G) research issues and producing the relative standardization proposals, has defined two different scenarios for WLAN-3G interworking[2]. The first, called "WLAN Direct IP Access", considers a direct access from the Access Network to an IP Network, i.e. without any intermediate step of data passing through a PLMN (Public Land Mobile Network). The second scenario, called "WLAN 3GPP IP Access", is based on accessing an IP Network via a PLMN through a tunnelling mechanism. 3GPP has not completely defined yet the security requirements, and has separately defined the security scenarios for a generic UE that accesses an IP Network and for a UE that is Willing to be registered to the 3G IP Multimedia Subsystem (IMS) [3,4]. In this paper we propose a security mechanism for a scenario where the user wishes to use IP Network connectivity directly provided from the AN (e.g. a WiFi hot spot) and at the same time also register to the IMS. The proposed mechanism reduces the number of authentication procedures to carry out with the AAA Server and consequently the number of messages exchanged with it.
引用
收藏
页码:2794 / +
页数:2
相关论文
共 50 条
  • [1] An efficient authentication protocol with anonymity for 3G/WLAN interworking
    Chien, Hung-Yu
    Teng, Hung-Yi
    Chen, Yen-Cheng
    JOURNAL OF INTERNET TECHNOLOGY, 2008, 9 (01): : 15 - 24
  • [2] Interworking of WLAN and 3G systems
    Lott, M
    Siebert, M
    Bonjour, S
    von Hugo, D
    Weckerle, M
    IEE PROCEEDINGS-COMMUNICATIONS, 2004, 151 (05): : 507 - 513
  • [3] Services in interworking 3G and WLAN environments
    Axiotis, DI
    Al-Gizawi, T
    Peppas, K
    Protonotarios, EN
    Lazarakis, FI
    Papadias, C
    Philippopoulos, PI
    IEEE WIRELESS COMMUNICATIONS, 2004, 11 (05) : 14 - 20
  • [4] 3G and WLAN interworking QOS solution
    Wallenius, E
    Hämäläinen, T
    Nihtilä, T
    Joutsensalo, J
    Koivisto, H
    Mobile and Wireless Communications Networks, 2003, : 29 - 33
  • [5] Security authentication of 3G-WLAN interworking
    Zhao, Yao
    Lin, Chuang
    Yin, Hao
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 429 - +
  • [6] Efficient 3G/WLAN interworking techniques for seamless roaming services with location-aware authentication
    Lee, M
    Kim, G
    Park, S
    Jun, S
    Nah, J
    Song, O
    NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, 3462 : 370 - 381
  • [7] 3G interworking with WLAN QoS 802.11e
    Wallenius, E
    Hämäläinen, T
    Nihtilä, T
    Joutsensalo, J
    Luostarinen, K
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 1803 - 1806
  • [8] Improved authentication protocol for WLAN-3G interworking networks
    Liu, Yun
    Fan, Ke-Feng
    Zhang, Su-Bing
    Mo, Wei
    Shen, Yu-Long
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (02): : 399 - 404
  • [9] A new amended authentication protocol in 3G-WLAN interworking
    Dong, Chundong
    Wang, Cong
    2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1261 - 1265
  • [10] The Analysis of WLAN/3G Interworking Access Based on a Mobility Model
    Fouladi, Roja
    Salimi, Somayeh
    Salahi, Ahmad
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 333 - 338