МОДИФІКОВАНИЙ СПОСІБ АВТЕНТИФІКАЦІЇ ДЛЯ ТЕХНОЛОГІЇ WI-FI DATA OFFLOADING
Анотація
Modified method of authenticating for wi-fi data offloading technology
To address the high (re-)authentication delays and UE identity discloser, we propose a fast local re-authentication method. Our method offers mutual authentication mechanism and guaranties data confidentiality by using hybrid cipher cryptosystem.
Посилання
Дундяк Р.Р., Глоба Л.С., Курдеча В.В. Перерозподіл трафіку мобільної мережі за допомогою технологій WI-FI Offloading та LTE /
Молодий
C. Lim, D.-Y. Kim, O.Song, and C.-H. Choi, “SHARE: seamless handover architecture for 3G-WLAN roaming environment,” Journal of Wireless Networks, vol. 15, no. 3, pp. 353–363, 2009.
Prasith Sangaree P, Krishnamurthy P. A new authentication mechanism for loosely coupled 3G-WLAN integrated networks. IEEE 59th Vehicular Technology Conference, Vol. 5. Spring, pp. 2998–3003, 2004
A. Dutta, T. Zhang, S. Madhani, K. Taniuchi, K. Fujimoto, Y. Katsube, Y. Ohba, and H. Schulzrinne, “Secure universal mobility for wireless Internet,” in Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, pp. 71-80, Oct. 2014.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2017 Артем Юрійович Лашко, Василь Васильович Курдеча
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.