2013
DOI: 10.5120/10036-4937
|View full text |Cite
|
Sign up to set email alerts
|

New Authentication and Key Agreement Protocol for LTE-WLAN Interworking

Abstract: New cellular networks are capable of providing high mobility, whereas WLANs are known for having relatively higher bandwidths. Therefore, interworking cellular networks with WLANs offers ubiquitous data services and relatively high data rates across modern networks. This interworking will enable a user to access new cellular services via a WLAN, while roaming within a range of hotspots. To provide secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible Authentication Protocol-Authentication and Key… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0
2

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 2 publications
0
4
0
2
Order By: Relevance
“…Firstly, the authentication between the MTCD and the Evolved Packet Core (EPC) through 3GPP or non-3GPP access network (e.g., E-UTRAN, WLAN, or WiMAX) can be performed by Authentication and Key Agreement (AKA) protocols: Evolved Packet System (EPS-AKA) and Extensible Authentication Protocol (EAP-AKA) [10]. However the challenge of M2M research is authentication by the group when a large number of MTC devices simultaneously accessing the network will cause severe authentication signalling congestion.…”
Section: Several New Security Issues and Existing Solutionsmentioning
confidence: 99%
“…Firstly, the authentication between the MTCD and the Evolved Packet Core (EPC) through 3GPP or non-3GPP access network (e.g., E-UTRAN, WLAN, or WiMAX) can be performed by Authentication and Key Agreement (AKA) protocols: Evolved Packet System (EPS-AKA) and Extensible Authentication Protocol (EAP-AKA) [10]. However the challenge of M2M research is authentication by the group when a large number of MTC devices simultaneously accessing the network will cause severe authentication signalling congestion.…”
Section: Several New Security Issues and Existing Solutionsmentioning
confidence: 99%
“…A new method that provides authentication between server and users without using cryptography has been proposed in , although it is not suitable for sequential authentication and re‐authentication processes. Some studies are carried out on modified authentication protocols, whereas other studies are proposed major amendments to 3G‐WLAN or LTE‐WLAN interworking architectures to enhance authentication in the handover process, for example, method to provide security in WLAN networks , authentication protocol in Worldwide Interoperability for Microwave Access (WiMAX) networks , authentication and key agreement in WLAN‐LTE , authentication protocols for 3G‐WLAN interworking architectures , and .…”
Section: Introductionmentioning
confidence: 99%
“…This method presents also several vulnerabilities as declared in (Y.E.H.E. Idrissi et al, 2012;A. H. Hassanein et al, 2013;B.…”
Section: Introductionmentioning
confidence: 99%