• DocumentCode
    480505
  • Title

    A Novel Access Authentication Scheme Based on ECC for 3G-WLAN Interworking Network

  • Author

    Huifang, Hou ; Ji Xinshen ; Guangqiang, Liu

  • Author_Institution
    Nat. Digital Switching Syst. Eng. & Technol. R&D Center, Univ. of Inf. & Eng. of the PLA, Zhengzhou, China
  • Volume
    5
  • fYear
    2008
  • fDate
    12-14 Dec. 2008
  • Firstpage
    1237
  • Lastpage
    1241
  • Abstract
    The focus of this paper is on access security aspects of 3G-WLAN interworking. Firstly, the authentication entities which do not rely on the concrete heterogeneous network are abstracted by analyzing 3G-WLAN multi-kind heterogeneous network model. And then a common authentication model is established and a novel access authentication and key agreement scheme combined elliptic curve cryptographic techniques with public key infrastructure is proposed. In this scheme, encryption data uses the shortest key length ECC with the same security coefficient, and authentication information is signed. In addition, the encryption/decryption and signature algorithm are carefully chosen and improved. Therefore mobile terminal computation overhead is reduced. Finally, the security analysis shows that the proposed scheme satisfies the security properties such as mutual authentication, key control, key confirmation, confidentiality of the sensitive data, non-repudiation, data integrity, resistance to replay attack. And the performance analysis also shows that the proposed scheme is efficient in regard to computation and communication overheads.
  • Keywords
    3G mobile communication; authorisation; error correction codes; public key cryptography; wireless LAN; 3G-WLAN interworking network; 3G-WLAN multikind heterogeneous network model; access authentication; access security aspects; authentication entities; common authentication model; concrete heterogeneous network; data integrity; decryption; elliptic curve cryptographic techniques; encryption data; key agreement scheme; key confirmation; key control; mobile terminal computation overhead; mutual authentication; public key infrastructure; replay attack resistance; security analysis; security coefficient; sensitive data confidentiality; shortest key length ECC; signature algorithm; Authentication; Communication system security; Data security; Elliptic curve cryptography; Elliptic curves; Information security; Mobile computing; Public key; Roaming; Wireless LAN; 3G-WLAN interworking; access auth-entication; ellipse curve; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and Software Engineering, 2008 International Conference on
  • Conference_Location
    Wuhan, Hubei
  • Print_ISBN
    978-0-7695-3336-0
  • Type

    conf

  • DOI
    10.1109/CSSE.2008.327
  • Filename
    4723132