2007
DOI: 10.1007/s11235-007-9044-2
|View full text |Cite
|
Sign up to set email alerts
|

Security architectures for B3G mobile networks

Abstract: This paper analyzes the security architectures employed in the interworking model that integrates thirdgeneration (3G) mobile networks and Wireless Local Area Networks (WLANs), materializing Beyond 3G (B3G) networks. Currently, B3G networks are deployed using two different access scenarios (i.e., WLAN Direct Access and WLAN 3GPP IP Access), each of which incorporates a specific security architecture that aims at protecting the involved parties and the data exchanged among them. These architectures consist of v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
4
2

Relationship

5
1

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…The 3G-WLAN integrated network architecture consists of four individual parts [1], [7] (see Figure 1): (i) the MS, (ii) the UMTS radio AN (UTRAN), (iii) the WLAN, and (iv) the 3G core network. The MS comprises the user's device (e.g., laptop, smart phone) and the universal subscriber identity module (USIM), which contains the user's subscriber information.…”
Section: G-wlan Network Architecture and Related Workmentioning
confidence: 99%
“…The 3G-WLAN integrated network architecture consists of four individual parts [1], [7] (see Figure 1): (i) the MS, (ii) the UMTS radio AN (UTRAN), (iii) the WLAN, and (iv) the 3G core network. The MS comprises the user's device (e.g., laptop, smart phone) and the universal subscriber identity module (USIM), which contains the user's subscriber information.…”
Section: G-wlan Network Architecture and Related Workmentioning
confidence: 99%
“…Each time that AVR is executed the requesting network receives L the size of fresh 3G AV [7]. A 3G AV includes a random challenge (RAND), the authentication token (AUTN), the expected response (XRES), the encryption key (CK) and the integrity key (IK) [6] [25]. To proceed with the EAP-AKA authentication, the AAA server selects a fresh AV and uses the CK and IK keys (of the selected AV) as well as the identity of the user to compute the EAP-AKA Master Key (MK).…”
Section: Initial Authentication Stepmentioning
confidence: 99%
“…3 -step a9). Trying to avoid the double execution of EAP-AKA [26], 3GPP 23.234 [1] specifies that in cases that the PDG trusts the WLAN network, the first execution of EAP-AKA for registration in the WLAN domain can be omitted. Although this policy speeds up the authentication procedure, it may raise new security risks and threats.…”
Section: G-wlan Interworking Architecturementioning
confidence: 99%