Skip to main content
Log in

One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The incorporation of Wireless Local Area Networks (WLANs) within the third generation (3G) networks materializes the next generation of mobile/wireless systems, named 3G-WLANs integrated networks. This paper proposes an improved authentication procedure for the 3G-WLANs integrated networks that enables a WLAN user to get access to the 3G packet switched services or to the public Internet through the 3G public land mobile network. The proposed procedure reduces significantly the authentication overhead compared to the legacy one, without compromising the provided security services. A security analysis of the proposed authentication procedure is elaborated that ensures the correctness of the authentication procedure, the provision of advanced security services and the elimination of possible attacks that may threaten the proposed authentication procedure. In addition, an energy cost analysis is carried out that compares the energy consumption induced by the legacy and the proposed authentication procedures. Finally, a communication cost analysis is provided that estimates the cost improvement of the proposed over the legacy authentication procedure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. 3GPP TS 23.234 (v7.3.0). (2006). 3GPP system to WLAN interworking; system description. Release 7, Sep. 2006.

  2. 3GPP TS 33.234 (v7.2.0). (2006). 3G security; WLAN interworking security; system description. Release 7, Sep. 2006.

  3. Arkko, J., & Haverinen, H. (2006). EAP-AKA authentication. RFC 4187, Jan. 2006.

  4. Kaufman, C. (2005). The internet key exchange (IKEv2) protocol. RFC 4306, Dec. 2005.

  5. Xenakis C. and Ntantogian C. (2007). Security architectures for B3G mobile networks. Telecommunication Systems 35: 123–139. doi:10.1007/s11235-007-9044-2.

    Article  Google Scholar 

  6. Liang W. and Wang W. (2005). On performance analysis of challenge/response based authentication in wireless networks. Computer Networks 48(2): 267–288

    Article  MATH  Google Scholar 

  7. Zhang Y. and Fujise M. (2006). An improvement for authentication protocol in third generation wireless networks. IEEE Transactions on Wireless Communications 5(9): 2348–2352. doi:10.1109/TWC.2006.1687756.

    Article  Google Scholar 

  8. Lin Y.B. and Chen Y.K. (2003). Reducing authentication signalling traffic in third-generation mobile network. IEEE Transactions on Wireless Communications 2(3): 493–501. doi:10.1109/TWC.2003.811171.

    Article  Google Scholar 

  9. Saraireh, J. A., & Yousef, S. (2006). A new authentication protocol for UMTS mobile networks. EURASIP Journal on Wireless Communications and Networking.

  10. Chang C.C., Lee J.S. and Chang Y.F. (2005). Efficient authentication protocols of GSM. Computer Communication 28(8): 921–928

    Article  Google Scholar 

  11. Yang C.C., Yang Y.W. and Liu W.T. (2006). A robust authentication protocol with non-repudiation service for integrating WLAN and 3G network. Wireless Personal Communications 39(2): 229–251. doi:10.1007/s11277-006-9090-1.

    Article  Google Scholar 

  12. Salgarelli L., Buddhikot M., Garay J., Patel S. and Miller S. (2003). Efficient authentication and key distribution in wireless IP networks. IEEE Wireless Communications 10(6): 52–61. doi:10.1109/MWC.2003.1265853.

    Article  Google Scholar 

  13. Prasithsangaree, P., & Krishnamurthy, P. (2004). A new authentication mechanism for loosely coupled 3G-WLAN integrated networks. In IEEE 59th Vehicular Technology Conference, (VTC) (Vol. 5, pp. 2998–3003), May 2004.

  14. Liang, W., & Wang, W. (2004). A local authentication control scheme based on AAA architecture in wireless networks. In IEEE 60th Vehicular Technology Conference (VTC) (Vol. 7, pp. 5276–5280), Sep. 2004.

  15. Lin Y.B., Chang M.F., Hsu M.T. and Wu L.Y. (2005). One-pass GPRS and IMS authentication procedure for UMTS. IEEE Journal on Selected Areas in Communications 23(6): 1233–1239. doi:10.1109/JSAC.2005.845631.

    Article  Google Scholar 

  16. Std, I.E.E.E. 802.11. (1999). Wireless LAN medium access control (MAC) and physical layer (PHY) specifications.

  17. Calhoun, P., Loughney, J., Guttman, E., Zorn, G., & Arkko, J. (2003). Diameter base protocol. RFC 3588, Sep. 2003.

  18. Std, I.E.E.E. 802.11i. (2004). Wireless medium access control (MAC) and physical layer (PHY) specifications: Medium access control (MAC) security enhancements.

  19. Kent, S., & Atkinson, R. (1998). Security architecture for internet protocol. RFC 2401, Nov. 1998.

  20. Kent, S., & Atkinson, R. (1998). IP encapsulating security payload (ESP). RFC 2406, Nov. 1998.

  21. Xenakis C. and Merakos L. (2004). Security in third generation mobile networks. Computer Communications 27(7): 638–650

    Article  Google Scholar 

  22. IEEE Std 802.11X. (2004). Port based network access control.

  23. ETSI TS 33.902. (2002). Formal analysis of 3G authentication protocol.

  24. Potlapally, N. R., Ravi, S., Raghunathan, A., & Jha, N. K. (2003). Analyzing the energy consumption of security protocols. In International Symposium on Low Power Electronics and Design (ISLPED), Seoul, Korea, Aug. 2003.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christoforos Ntantogian.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ntantogian, C., Xenakis, C. One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks. Wireless Pers Commun 48, 569–584 (2009). https://doi.org/10.1007/s11277-008-9548-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-008-9548-4

Keywords

Navigation