National Changhua University of Education Institutional Repository : Item 987654321/12158
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 6507/11669
造访人次 : 29717190      在线人数 : 388
RC Version 3.2 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 进阶搜寻

jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://ir.ncue.edu.tw/ir/handle/987654321/12158

题名: GPRS/UMTS-aided Authentication Protocol for Wireless LANs
作者: Tseng, Yuh-Min
贡献者: 數學系
日期: 2006-12
上传时间: 2012-07-03T03:44:44Z
出版者: IEEE
摘要: Wireless local area network (WLAN) and cellular network are two important
technologies for providing wireless communications. For user authentication of WLAN, the
IEEE 802.1X standard provides an authentication framework that is based on the Extensible
Authentication Protocol (EAP). When a roaming user wants to access WLANs provided by
different operators, the user must remember multiple identities and the corresponding
authentication credentials. Obviously, such an exercise is not user friendly. This problem is caused
by the fact that a visited WLAN does not have the authentication credential of a roaming user.
Previous proposals have studied the authentication of inter-network roaming across different
WLANs, or across a cellular network and a WLAN. As is known, cellular networks provide wider
service areas, ‘always-on’ and ubiquitous connectivity. The integration of WLAN and cellular
networks has a management advantage that it can unify the subscriber identity and the
corresponding credential. In this paper, we first propose a practical certificate distribution scheme.
The certificate distribution scheme allows roaming users of a cellular network to obtain temporary
certificates from their home cellular network. Afterward adopting certificate-based authentication
protocol of the IEEE 802.1X standard, roaming users may use temporary certificates to access
WLANs. The proposed solution achieves easy subscriber management and pervasive access. As
demonstrated, the proposed solution also provides mutual authentication and strong identity
protection, in addition to withstanding the man-in-the-middle attack and the eavesdropping attack.
A performance evaluation shows that the proposed protocol is well suited for roaming users with
mobile devices.
關聯: IEE Proceedings-Communications, 153(6): 810-817
显示于类别:[數學系] 期刊論文

文件中的档案:

档案 大小格式浏览次数
index.html0KbHTML582检视/开启


在NCUEIR中所有的数据项都受到原著作权保护.

 


DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈