2014
DOI: 10.1002/dac.2769
|View full text |Cite
|
Sign up to set email alerts
|

Improved IPSec tunnel establishment for 3GPP–WLAN interworking

Abstract: Interworking between wireless local area network (WLAN) and the 3rd Generation Partnership Project (3GPP) such as Long Term Evolution (LTE) is facing more and more problems linked to security threats. Securing this interworking is a major challenge because of the vastly different architectures used within each network. Therefore, security is one of the major technical concerns in wireless networks that include measures such as authentication and encryption. Among the major challenges in the interworking securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Meanwhile, the method of changing the cryptographic algorithms applying in IPsec for different application scenarios is becoming inefficient and complicated. At present, relevant work is mostly focused on adding IPsec cryptographic algorithms, establishing a security gateway for network communication, and the impacts of IPsec on network applications [16][17][18]. However, to the best of our knowledge, there is little research on the simplification and flexibility of algorithm invocation in IPsec.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, the method of changing the cryptographic algorithms applying in IPsec for different application scenarios is becoming inefficient and complicated. At present, relevant work is mostly focused on adding IPsec cryptographic algorithms, establishing a security gateway for network communication, and the impacts of IPsec on network applications [16][17][18]. However, to the best of our knowledge, there is little research on the simplification and flexibility of algorithm invocation in IPsec.…”
Section: Introductionmentioning
confidence: 99%
“…The IKE protocol is always a hotspot of IPsec research, and the researches tend to focus on specification simplification, realization of interoperability, DoS attack resistance, and reflection attack resistance all along. In October 2014, updated IKEv2 (RFC 7296) was already standardized with better protection and accuracy.…”
Section: Introductionmentioning
confidence: 99%