CFP last date
22 April 2024
Reseach Article

New Authentication and Key Agreement Protocol for LTE-WLAN Interworking

by Ahmed H. Hassanein, Ahmed A. Abdel Hafez, Abd El-hamid A. Gaafar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 19
Year of Publication: 2013
Authors: Ahmed H. Hassanein, Ahmed A. Abdel Hafez, Abd El-hamid A. Gaafar
10.5120/10036-4937

Ahmed H. Hassanein, Ahmed A. Abdel Hafez, Abd El-hamid A. Gaafar . New Authentication and Key Agreement Protocol for LTE-WLAN Interworking. International Journal of Computer Applications. 61, 19 ( January 2013), 20-24. DOI=10.5120/10036-4937

@article{ 10.5120/10036-4937,
author = { Ahmed H. Hassanein, Ahmed A. Abdel Hafez, Abd El-hamid A. Gaafar },
title = { New Authentication and Key Agreement Protocol for LTE-WLAN Interworking },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 19 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 20-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number19/10036-4937/ },
doi = { 10.5120/10036-4937 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:09:52.704263+05:30
%A Ahmed H. Hassanein
%A Ahmed A. Abdel Hafez
%A Abd El-hamid A. Gaafar
%T New Authentication and Key Agreement Protocol for LTE-WLAN Interworking
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 19
%P 20-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

New cellular networks are capable of providing high mobility, whereas WLANs are known for having relatively higher bandwidths. Therefore, interworking cellular networks with WLANs offers ubiquitous data services and relatively high data rates across modern networks. This interworking will enable a user to access new cellular services via a WLAN, while roaming within a range of hotspots. To provide secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is used. However, EAP-AKA has several vulnerabilities. This paper analyzes vulnerabilities in LTE-WLAN interworking and proposes a new authentication and key agreement protocol based on EAP-AKA.

References
  1. Third Generation Partnership Project (3GPP), 3GPP TS 33. 401 v8. 1. 1 "3G System Architecture Evolution (SAE): Security architecture (Release8)", October 2008
  2. Third Generation Partnership Project (3GPP), 3GPP TS 33. 821 v1. 0. 0 " Rationale and track of security decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution (SAE) (Release 8)" , December 2007
  3. Third Generation Partnership Project (3GPP), 3GPP TS 33. 102 v8. 0. 0 "3G Security: Security Architecture (Release 8)", June 2008
  4. J. Arkko, H. Haverinen, "Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)", IETF RFC 4187, January 2006
  5. Third Generation Partnership Project (3GPP), 3GPP TS 23. 234 v8. 1. 0 "3G security: Wireless Local Area Network (WLAN) Interworking Security (Release 8)", March 2008
  6. Third Generation Partnership Project (3GPP), 3GPP TS 33. 402 v8. 3. 0 "Architecture Enhancements for non-3GPP accesses (Release 8)", September 2008
  7. LTE Security Dan Forsberg, Günther Horn, Wolf-Dietrich Moeller and Valtteri Niemi © 2010 John Wiley & Sons, Ltd
  8. Cryptography and Network Security, William Stallings© 2007 Prentice Hall.
  9. Elliptic Curve Cryptography An Implementation Guide http://tataelxsi. com/whitepapers/ECC_Tut_v1_0. pdf.
  10. Hyeran Mun, Kyusuk Han, and Kwangjo Kim, "3G-WLAN Interworking: Security Analysis and New Authentication and Key Agreement based on EAP-AKA", 2009 IEEE Wireless Telecommunications Symposium .
Index Terms

Computer Science
Information Sciences

Keywords

LTE Interworking 3G-WLAN