Font Size: a A A

Study And Implementation Of The Authentication Methods In 3g-wlan Integrated Network

Posted on:2010-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:E L QuFull Text:PDF
GTID:2198330332488355Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
In recent years, the wireless network technology has made rapid development,3G and WLAN applications become widespread gradually, and both the network coverage of the business, transfer rate, roaming, and so on are strongly complementary to each other. Therefore, the realization of 3G and WLAN integrated network in hot spots for the high-speed access is a highly efficient mode of application.This paper studies security authentication technology of 3G-WLAN integrated network. Systematically analyzing the framework, main characteristics and threats of 3G-WLAN integrated network which was proposed by 3GPP, referred to security matters that exist in EAP-AKA method such as the fake WLAN-AN attacks, divulging of user private information, MITM (Man in the Middle) vulnerability, and so on, a new authentication method EAP-TAKA (EAP tunnel AKA) was proposed, which is based on EAP-TTLS Technology. The analysis result shows that this method can effectively solve these security issues, while maintaining a lower cost of computing and communications.In order to verify the effectiveness of the EAP-TAKA, a "3G-WLAN integrated network access authentication platform" was designed, and its structure and composition of the module were also given. After the realization of the EAP-AKA authentication and EAP-TAKA authentication, test results showed that the EAP-TAKA method could ensure the security of access, while maintaining a relative efficient access.
Keywords/Search Tags:WLAN, 3GPP, Integration, Authentication
PDF Full Text Request
Related items