Font Size: a A A

Research On 3G-WLAN Interworking Access Security

Posted on:2012-09-25Degree:MasterType:Thesis
Country:ChinaCandidate:P LiuFull Text:PDF
GTID:2178330335966725Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
According to the security vulnerabilities of authentication protocols of 3G-WLAN interworking , which is based on the symmetric cryptography, the certificate public key cryptography and the identity-based public key cryptography, a new authentication model for 3G-WLAN interworking based on certificateless public key cryptography, whose security attributes was formally proofed with PCL ( Protocol Composition Logic), is proposed in this paper. Then the deductive process of the security access scheme including IMSI access authentication protocol and fast re-authentication protocol of TMSI access was derived with the PDS (Protocol Derivation System).The comparison between the access scheme and other protocols indicates that IMSI-Auth eliminates the security vulnerabilities of other protocols, and saves the cost of certificate distribution, verification and storage, and does not have the key escrow of identity-based public key cryography. The authentication delay of Fast-Re-Auth on simulation platform is less than that of re-authentication of EAP-AKA.It is showed that the scheme not only achieves the desired goals with non-repudiation, user identity confidentiality, entity authentication, session key negotiation and update mechanism, by the security and Performance analysis of secure access scheme, but also can prevent re-direction attack, replay attack, man-in-middle attack and denial of service attack. The secure access scheme is outstanding about the complexity of the cryptographic algorithms, protocol flexibility and the abilities to guard against all kinds of attacks, and is more suitable for the 3G-WLAN interworking, in which the computing power and bandwidth of wireless terminals are limited, at the aspects of the calculation, storage and communication overhead.
Keywords/Search Tags:3G-WLAN, Certificateless public key cryptography, Protocol Composition Logic, Protocol Derivation System, Authentication
PDF Full Text Request
Related items