A handoff authentication and key agreement scheme for integration of UMTS and 802.11 WLANs
A handoff authentication and key agreement scheme for integration of UMTS and 802.11 WLANs
- Author(s): Yen-Chieh Ouyang and Chung-Hua Chu
- DOI: 10.1049/cp:20040717
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Fifth IEE International Conference on 3G Mobile Communication Technologies (3G 2004) The Premier Technical Conference for 3G and Beyond — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): Yen-Chieh Ouyang and Chung-Hua Chu Source: Fifth IEE International Conference on 3G Mobile Communication Technologies (3G 2004) The Premier Technical Conference for 3G and Beyond, 2004 p. 461 – 465
- Conference: Fifth IEE International Conference on 3G Mobile Communication Technologies (3G 2004) The Premier Technical Conference for 3G and Beyond
- DOI: 10.1049/cp:20040717
- ISBN: 0 86341 388 9
- Location: London, UK
- Conference date: 18-20 Oct. 2004
- Format: PDF
We propose a secure handoff for integration of UMTS and IEEE 802.11 WLANs. The handoff between 802.11 WLAN and UMTS has some drawbacks and could be hijacked in the middle of a communication session. An architecture built for a secure handoff scheme is proposed to fix that problem. When UMTS users handover to an 802.11 WLAN environment, the dynamic key exchange protocol (DKEP) is used to build a secure handoff environment. The mobile station (MS) and the access point (AP) compute their session key individually. The protocol includes three phases, and all the steps of the phases are protected by public-key encryption. Therefore, no information can be hijacked between MS and AP. From the security analysis we know that the handoff between WLAN and UMTS is guaranteed in various aspects. For example, user identity and new register can be protected, avoiding denial of service, key reuse, and so on.
Inspec keywords: public key cryptography; cryptography; message authentication; internetworking; telecommunication security; wireless LAN; 3G mobile communication; protocols
Subjects: Local area networks; Data security; Protocols; Computer communications; Cryptography; Mobile radio systems; Protocols
Related content
content/conferences/10.1049/cp_20040717
pub_keyword,iet_inspecKeyword,pub_concept
6
6