Secure authentication in heterogeneous wireless networks

13Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The convergence of cellular and IP technologies has pushed the integration of 3G andWLANnetworks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user’s authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user’s location only to within a current cell and restrictions on accessing users’ location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G-WLAN user authentication. © 2008 - IOS Press and the authors.

Cite

CITATION STYLE

APA

Durresi, A., Durresi, M., & Barolli, L. (2008). Secure authentication in heterogeneous wireless networks. Mobile Information Systems, 4(2), 119–130. https://doi.org/10.1155/2008/135848

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free