The Study on Authentication and Billing Protocols for the Integration of WLAN and Cellular Networks

碩士 === 朝陽科技大學 === 網路與通訊研究所 === 92 === Wireless communications have developed rapidly and been applied for many services. Cellular (the third-generation) mobile networks and WLAN (Wireless Local Area Network) networks are two important technologies for providing wireless communications. The third-gen...

Full description

Bibliographic Details
Main Authors: Jiann-Haur Su, 蘇建豪
Other Authors: Yuh-Min Tseng
Format: Others
Language:en_US
Published: 2004
Online Access:http://ndltd.ncl.edu.tw/handle/jfarev
Description
Summary:碩士 === 朝陽科技大學 === 網路與通訊研究所 === 92 === Wireless communications have developed rapidly and been applied for many services. Cellular (the third-generation) mobile networks and WLAN (Wireless Local Area Network) networks are two important technologies for providing wireless communications. The third-generation (3G) networks provide wider service areas, and “always-on” and ubiquitous connectivity with low-speed data rate. WLAN networks offer higher data rate and the easy compatibility of wired Internet, but cover smaller areas. In fact, 3G and WLAN possess complementary properties. Integrating 3G and WLAN networks may offer subscribers high-speed wireless data services and ubiquitous connectivity. For integrating two heterogeneous networks, several issues should be involved authentication, billing, quality of service, and seamless roaming between 3G and WLAN networks. In this thesis, we address the authentication and billing problems and propose two protocols that provide both authentication and billing services. One protocol utilizes a one-time password approach to authenticate subscribers. This protocol is efficient in both computation time and authentication procedures. Because of the restrictions of the password-based approach, this protocol could not offer the non-repudiation property for the billing problem. Another protocol is constructed on a public-key based system (i.e., certificates). Although it requires more computation time than the password-based approach, non-repudiation is guaranteed. Performance analysis simulation results are given to validate our two protocols.