{"title":"3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model","authors":"M. Sher, T. Magedanz","doi":"10.1109/ARES.2007.1","DOIUrl":null,"url":null,"abstract":"In this paper we present the vulnerability, threats and attacks for third generation (3G) networks converged with WLAN and propose the security model addressing the roaming and non-roaming security scenarios. Many threats against 3G network resources can be realised by attacking the WLAN access network, therefore it is important to identify the security requirements for 3G-WLAN interworking and choose a security solution that is robust and dynamic to different levels of WLAN access network. The proposed architecture is based on the extensible authentication protocol (EAP) for USIM authentication & key agreement (AKA) and authorization procedures, and secure tunnel establishment using IKEv2 (Internet key exchange) protocol to minimize security threats. We will also discuss the termination of fake or forge WLAN session to protect the user confidential information on vulnerable wireless link. The development is part of secure service provisioning (SSP) framework of IP multimedia system (IMS) at 3Gb Testbed of Fokus Fraunhofer","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Second International Conference on Availability, Reliability and Security (ARES'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2007.1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
In this paper we present the vulnerability, threats and attacks for third generation (3G) networks converged with WLAN and propose the security model addressing the roaming and non-roaming security scenarios. Many threats against 3G network resources can be realised by attacking the WLAN access network, therefore it is important to identify the security requirements for 3G-WLAN interworking and choose a security solution that is robust and dynamic to different levels of WLAN access network. The proposed architecture is based on the extensible authentication protocol (EAP) for USIM authentication & key agreement (AKA) and authorization procedures, and secure tunnel establishment using IKEv2 (Internet key exchange) protocol to minimize security threats. We will also discuss the termination of fake or forge WLAN session to protect the user confidential information on vulnerable wireless link. The development is part of secure service provisioning (SSP) framework of IP multimedia system (IMS) at 3Gb Testbed of Fokus Fraunhofer