Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pasi Eronen is active.

Publication


Featured researches published by Pasi Eronen.


international workshop on security | 2005

Implications of Unlicensed Mobile Access (UMA) for GSM security

Sandro Grech; Pasi Eronen

Despite its imperfections, GSM security has stood well the test of time. In part, this security success has relied on closed platforms that prevent the end-user from tampering with the GSM protocol stacks. While it is possible to build phones that do not have such restrictions, this is difficult due to, e.g., legislation and technical complexity. Unlicensed Mobile Access (UMA) is a new technology that provides access to GSM services over Wireless LAN or Bluetooth. It also challenges the assumption of closed platforms, since it is relatively easy to implement a UMA phone purely in software running on standard PC hardware and operating systems. This paper examines the security implications of UMA for GSM security, focusing especially on the impact of open terminal platforms. We identify several areas where open platforms may increase risks to both honest users and network operators, and propose countermeasures for mitigating these risks.


international workshop on security | 2004

Authentication components: engineering experiences and guidelines

Pasi Eronen; Jari Arkko

Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly integrated, while in other cases, such as EAP (Extensible Authentication Protocol) and Kerberos, they are separate and often implemented in different endpoints. However, careless application of this separation has lead to several vulnerabilities. In this paper we discuss reasons why this separation is often useful, what mistakes have been made, and what these mistakes have in common. We then describe some approaches how these problems could be avoided, especially focusing on EAP in wireless LANs. We also present some engineering observations that should be taken into account when designing reusable authentication components in the future.


international workshop on security | 2004

Authentication components: engineering experiences and guidelines (transcript of discussion)

Pasi Eronen

My talk is on authentication components. What I mean by an authentication component is basically a reusable building block. I’m talking about building blocks in a strictly engineering sense (there is very little novel cryptograph use involved), building blocks that are useful to system designers when they’re designing a system and need a protocol for doing something, and they don’t want to reinvent all the cryptographic stuff themselves. Usually they are not experts in that either, so it’s a good thing that they don’t always reinvent things from scratch.


RFC | 2005

Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)

Hannes Tschofenig; Pasi Eronen


Archive | 2004

Subscriber authentication for unlicensed mobile access signaling

Pasi Eronen


vehicular technology conference | 2007

Energy Consumption of Always-On Applications in WCDMA Networks

Henry Haverinen; Jonne Siren; Pasi Eronen


Archive | 2008

TCP Wake-Up: Reducing Keep-Alive Traffic in Mobile IPv4 and IPsec NAT Traversal

Pasi Eronen


Archive | 2004

METHOD AND APPARATUS FOR INDICATING SERVICE SET IDENTIFIERS TO PROBE FOR

Hannu Hietalahti; Pasi Eronen


Archive | 2005

IP mobility in mobile telecommunications system

Henry Haverinen; Heikki Riittinen; Pasi Eronen


Archive | 2006

Power-efficient address mapping scheme

Pasi Eronen; Lauri Tarkkala; Henry Haverinen

Collaboration


Dive into the Pasi Eronen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Matt Blaze

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

George Danezis

University College London

View shared research outputs
Top Co-Authors

Avatar

Bruce Christianson

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge