DocumentCode :
480505
Title :
A Novel Access Authentication Scheme Based on ECC for 3G-WLAN Interworking Network
Author :
Huifang, Hou ; Ji Xinshen ; Guangqiang, Liu
Author_Institution :
Nat. Digital Switching Syst. Eng. & Technol. R&D Center, Univ. of Inf. & Eng. of the PLA, Zhengzhou, China
Volume :
5
fYear :
2008
fDate :
12-14 Dec. 2008
Firstpage :
1237
Lastpage :
1241
Abstract :
The focus of this paper is on access security aspects of 3G-WLAN interworking. Firstly, the authentication entities which do not rely on the concrete heterogeneous network are abstracted by analyzing 3G-WLAN multi-kind heterogeneous network model. And then a common authentication model is established and a novel access authentication and key agreement scheme combined elliptic curve cryptographic techniques with public key infrastructure is proposed. In this scheme, encryption data uses the shortest key length ECC with the same security coefficient, and authentication information is signed. In addition, the encryption/decryption and signature algorithm are carefully chosen and improved. Therefore mobile terminal computation overhead is reduced. Finally, the security analysis shows that the proposed scheme satisfies the security properties such as mutual authentication, key control, key confirmation, confidentiality of the sensitive data, non-repudiation, data integrity, resistance to replay attack. And the performance analysis also shows that the proposed scheme is efficient in regard to computation and communication overheads.
Keywords :
3G mobile communication; authorisation; error correction codes; public key cryptography; wireless LAN; 3G-WLAN interworking network; 3G-WLAN multikind heterogeneous network model; access authentication; access security aspects; authentication entities; common authentication model; concrete heterogeneous network; data integrity; decryption; elliptic curve cryptographic techniques; encryption data; key agreement scheme; key confirmation; key control; mobile terminal computation overhead; mutual authentication; public key infrastructure; replay attack resistance; security analysis; security coefficient; sensitive data confidentiality; shortest key length ECC; signature algorithm; Authentication; Communication system security; Data security; Elliptic curve cryptography; Elliptic curves; Information security; Mobile computing; Public key; Roaming; Wireless LAN; 3G-WLAN interworking; access auth-entication; ellipse curve; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Software Engineering, 2008 International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-3336-0
Type :
conf
DOI :
10.1109/CSSE.2008.327
Filename :
4723132
Link To Document :
بازگشت