National Changhua University of Education Institutional Repository : Item 987654321/12158
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 6507/11669
造訪人次 : 29728755      線上人數 : 520
RC Version 3.2 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 進階搜尋

請使用永久網址來引用或連結此文件: http://ir.ncue.edu.tw/ir/handle/987654321/12158

題名: GPRS/UMTS-aided Authentication Protocol for Wireless LANs
作者: Tseng, Yuh-Min
貢獻者: 數學系
日期: 2006-12
上傳時間: 2012-07-03T03:44:44Z
出版者: IEEE
摘要: Wireless local area network (WLAN) and cellular network are two important
technologies for providing wireless communications. For user authentication of WLAN, the
IEEE 802.1X standard provides an authentication framework that is based on the Extensible
Authentication Protocol (EAP). When a roaming user wants to access WLANs provided by
different operators, the user must remember multiple identities and the corresponding
authentication credentials. Obviously, such an exercise is not user friendly. This problem is caused
by the fact that a visited WLAN does not have the authentication credential of a roaming user.
Previous proposals have studied the authentication of inter-network roaming across different
WLANs, or across a cellular network and a WLAN. As is known, cellular networks provide wider
service areas, ‘always-on’ and ubiquitous connectivity. The integration of WLAN and cellular
networks has a management advantage that it can unify the subscriber identity and the
corresponding credential. In this paper, we first propose a practical certificate distribution scheme.
The certificate distribution scheme allows roaming users of a cellular network to obtain temporary
certificates from their home cellular network. Afterward adopting certificate-based authentication
protocol of the IEEE 802.1X standard, roaming users may use temporary certificates to access
WLANs. The proposed solution achieves easy subscriber management and pervasive access. As
demonstrated, the proposed solution also provides mutual authentication and strong identity
protection, in addition to withstanding the man-in-the-middle attack and the eavesdropping attack.
A performance evaluation shows that the proposed protocol is well suited for roaming users with
mobile devices.
關聯: IEE Proceedings-Communications, 153(6): 810-817
顯示於類別:[數學系] 期刊論文

文件中的檔案:

檔案 大小格式瀏覽次數
index.html0KbHTML582檢視/開啟


在NCUEIR中所有的資料項目都受到原著作權保護.

 


DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋