English  |  正體中文  |  简体中文  |  Items with full text/Total items : 6469/11641
Visitors : 19008143      Online Users : 56
RC Version 3.2 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Adv. Search

Please use this identifier to cite or link to this item: http://ir.ncue.edu.tw/ir/handle/987654321/12158

Title: GPRS/UMTS-aided Authentication Protocol for Wireless LANs
Authors: Tseng, Yuh-Min
Contributors: 數學系
Date: 2006-12
Issue Date: 2012-07-03T03:44:44Z
Publisher: IEEE
Abstract: Wireless local area network (WLAN) and cellular network are two important
technologies for providing wireless communications. For user authentication of WLAN, the
IEEE 802.1X standard provides an authentication framework that is based on the Extensible
Authentication Protocol (EAP). When a roaming user wants to access WLANs provided by
different operators, the user must remember multiple identities and the corresponding
authentication credentials. Obviously, such an exercise is not user friendly. This problem is caused
by the fact that a visited WLAN does not have the authentication credential of a roaming user.
Previous proposals have studied the authentication of inter-network roaming across different
WLANs, or across a cellular network and a WLAN. As is known, cellular networks provide wider
service areas, ‘always-on’ and ubiquitous connectivity. The integration of WLAN and cellular
networks has a management advantage that it can unify the subscriber identity and the
corresponding credential. In this paper, we first propose a practical certificate distribution scheme.
The certificate distribution scheme allows roaming users of a cellular network to obtain temporary
certificates from their home cellular network. Afterward adopting certificate-based authentication
protocol of the IEEE 802.1X standard, roaming users may use temporary certificates to access
WLANs. The proposed solution achieves easy subscriber management and pervasive access. As
demonstrated, the proposed solution also provides mutual authentication and strong identity
protection, in addition to withstanding the man-in-the-middle attack and the eavesdropping attack.
A performance evaluation shows that the proposed protocol is well suited for roaming users with
mobile devices.
Relation: IEE Proceedings-Communications, 153(6): 810-817
Appears in Collections:[數學系] 期刊論文

Files in This Item:

File SizeFormat

All items in NCUEIR are protected by copyright, with all rights reserved.


DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback