Authentication and Key Agreement in a 3G-INTERNET-WiFi Crossplatform Communication System

Article Preview

Abstract:

As a new breed of enterprise services that have spawned from the Internet to also include metropolitan 3G, WiFi, and WiMAX networks today, cross-platform communication system is widely studied and deployed. At the same time, the performance and the security of cross-platform communication system are becoming the focus. In this paper, we present two authentication and key agreement protocols in our 3G-Internet-Wi-Fi cross-platform communication system, one based on pre-set password and one on certificate. They provide a foundation for the total solution of the system along with corresponding protocols of 3G and Wi-Fi.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1217-1221

Citation:

Online since:

January 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] 3GPP TS 33. 102. 3G Security: Security Architecture. 2001, 10.

Google Scholar

[2] 3GPP2 S. S0053 V1. 0 Common Cryptographic Algorithms[S], 2002. 01.

Google Scholar

[3] Wi-Fi Alliance. Wi-Fi protected access (WPA) version 1. 2[S]. C Brian Grimm , Wi-Fi Alliance, December 16, (2002).

DOI: 10.1007/978-3-319-78262-1_175

Google Scholar

[4] Deng HS, Zuo YQ, Zhao YM, Bao ZD. A security-provable mutually authenticated key agreement protocol in mobile communication. Journal of Software, 2003, 14(8): 1489−1494 (in Chinese with English abstract). http: /www. jos. org. cn/1000-9825/ 14/1489. htm.

DOI: 10.1360/jos170868

Google Scholar

[5] Wilson SB, Johnson D, Menezes A. Key agreement protocols and their security analysis. In: Darnell M, ed. Proc. of the 6th Int'l Conf. on Crypotography and Coding. LNCS 1355, Berlin: Springer-Verlag, 1997. 30−45.

Google Scholar

[6] Canetti R, Krawczyk H. Analysis and key-exchange protocols and their use for building secure channels. In: Pfitzmann B, ed. Advances in Cryptology-EUROCRYPT 2001. LNCS 2045, Berlin: Springer-Verlag, 2001. 453−474.

DOI: 10.1007/3-540-44987-6_28

Google Scholar

[7] Boyd C, Mathuria A. Protocols for Authentication and Key Establishment. Berlin: Springer-Verlag, 2003. 137−199.

Google Scholar

[7] Ding Yong, Li yahui. Integration of Signature Encryption and Key Exchange. Proceeding of 2008 International Conference on Computational Intelligence and Security CIS'08, Shuzhou, China, Dec. 2008, 299-302.

DOI: 10.1109/cis.2008.11

Google Scholar