English  |  正體中文  |  简体中文  |  Items with full text/Total items : 6469/11641
Visitors : 14876211      Online Users : 430
RC Version 3.2 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Adv. Search
LoginUploadHelpAboutAdminister

Please use this identifier to cite or link to this item: http://ir.ncue.edu.tw/ir/handle/987654321/12152

Title: Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
Authors: Tseng, Yuh-Min;Yang, Chou-Chen;Su, Jiann-Haur
Contributors: 數學系
Keywords: Authentication;Security;WLAN;3G;Billing;Cellular network
Date: 2004-06
Issue Date: 2012-07-03T03:44:21Z
Publisher: Kluwer Academic Publishers.
Abstract: Wireless communications have developed rapidly and have been applied for many services. Cellular (the third-generation) mobile networks and wireless local area network (WLAN) are two important technologies for providing wireless communications. The third-generation (3G) networks provide wider service areas, and “always-o” and ubiquitous connectivity with low-speed data rate. WLAN networks offer higher data rate and the easy compatibility of wired Internet, but cover smaller areas. In fact, 3G and WLAN possess complementary properties. Integrating 3G and WLAN networks may offer subscribers high-speed wireless data services and ubiquitous connectivity. For integrating two heterogeneous networks, several issues should be involved, authentication, billing, quality of service, and seamless roaming between 3G and WLAN networks. In this paper, we address the authentication and billing problems and propose two protocols that provide both authentication and billing services. One protocol utilizes a one-time password approach to authenticate subscribers. This protocol is efficient in both computation time and authentication procedures. Because of the restrictions of the password-based approach, this protocol could not offer the non-repudiation property for the billing problem. Another protocol is constructed on a public-key-based system (i.e., certificates). Although it requires more computation time than the password-based approach, non-repudiation is guaranteed. Performance analysis simulation results are given to validate our two protocols.
Relation: Wireless Personal Communications, 29(3-4): 351-366
Appears in Collections:[數學系] 期刊論文

Files in This Item:

File SizeFormat
index.html0KbHTML478View/Open


All items in NCUEIR are protected by copyright, with all rights reserved.

 


DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback