Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

New Authentication and Key Agreement Protocol for LTE-WLAN Interworking

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 61 - Number 19
Year of Publication: 2013
Authors:
Ahmed H. Hassanein
Ahmed A. Abdel Hafez
Abd El-hamid A. Gaafar
10.5120/10036-4937

Ahmed H Hassanein, Ahmed Abdel A Hafez and Abd El-hamid A Gaafar. Article: New Authentication and Key Agreement Protocol for LTE-WLAN Interworking. International Journal of Computer Applications 61(19):20-24, January 2013. Full text available. BibTeX

@article{key:article,
	author = {Ahmed H. Hassanein and Ahmed A. Abdel Hafez and Abd El-hamid A. Gaafar},
	title = {Article: New Authentication and Key Agreement Protocol for LTE-WLAN Interworking},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {61},
	number = {19},
	pages = {20-24},
	month = {January},
	note = {Full text available}
}

Abstract

New cellular networks are capable of providing high mobility, whereas WLANs are known for having relatively higher bandwidths. Therefore, interworking cellular networks with WLANs offers ubiquitous data services and relatively high data rates across modern networks. This interworking will enable a user to access new cellular services via a WLAN, while roaming within a range of hotspots. To provide secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is used. However, EAP-AKA has several vulnerabilities. This paper analyzes vulnerabilities in LTE-WLAN interworking and proposes a new authentication and key agreement protocol based on EAP-AKA.

References

  • Third Generation Partnership Project (3GPP), 3GPP TS 33. 401 v8. 1. 1 "3G System Architecture Evolution (SAE): Security architecture (Release8)", October 2008
  • Third Generation Partnership Project (3GPP), 3GPP TS 33. 821 v1. 0. 0 " Rationale and track of security decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution (SAE) (Release 8)" , December 2007
  • Third Generation Partnership Project (3GPP), 3GPP TS 33. 102 v8. 0. 0 "3G Security: Security Architecture (Release 8)", June 2008
  • J. Arkko, H. Haverinen, "Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)", IETF RFC 4187, January 2006
  • Third Generation Partnership Project (3GPP), 3GPP TS 23. 234 v8. 1. 0 "3G security: Wireless Local Area Network (WLAN) Interworking Security (Release 8)", March 2008
  • Third Generation Partnership Project (3GPP), 3GPP TS 33. 402 v8. 3. 0 "Architecture Enhancements for non-3GPP accesses (Release 8)", September 2008
  • LTE Security Dan Forsberg, Günther Horn, Wolf-Dietrich Moeller and Valtteri Niemi © 2010 John Wiley & Sons, Ltd
  • Cryptography and Network Security, William Stallings© 2007 Prentice Hall.
  • Elliptic Curve Cryptography An Implementation Guide http://tataelxsi. com/whitepapers/ECC_Tut_v1_0. pdf.
  • Hyeran Mun, Kyusuk Han, and Kwangjo Kim, "3G-WLAN Interworking: Security Analysis and New Authentication and Key Agreement based on EAP-AKA", 2009 IEEE Wireless Telecommunications Symposium .