Managing Handover Authentication in Big-domain Wireless Environment

نویسندگان

  • Changsheng Wan
  • Aiqun Hu
  • Juan Zhang
چکیده

Mobility management is the key feature of wireless network. When the mobile node roams from the home network to the foreign network, the foreign network access server usually does not have the security material of the mobile node, and can not authenticate the mobile node by itself. Thus the three-party authentication is used, and the foreign network access server consults the home authentication server of the mobile node for authentication (usually through the foreign authentication server). However, this sort of authentication will lead to a long latency. With the wide deployment of latency sensitive services in wireless network, the handover authentication latency becomes more and more flagrant. Currently, many standards organizations are working on this issue, and they defined a lot of protocols for optimizing the handover authentication procedure. These protocols mainly include the fast re-authentication protocol, the pre-authentication protocol and the context transfer based authentication protocol. However, current protocols will put a heavy burden on the authentication server in big domain, and thus add a long latency to the handover authentication procedure. This paper presents an elliptic curve based authenticated key agreement protocol with mutual authentication property to address this problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

OSNP: Secure wireless authentication protocol using one-time key

Handover security and efficiency have become more and more important in modern wireless network designs. In this paper, we propose a new protocol using the one-time key for user authentication. The proposed protocol can support both intra-domain and interdomain authentications efficiently. Our protocol requires five messages for intra-domain initial authentication; three for subsequent authenti...

متن کامل

A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks

In the paper, we propose an efficient two-factor localised authentication scheme for inter-domain handover and roaming in IEEE 802.11 based service-oriented wireless mesh networks (WMNs). Some important aspects, such as resource-constraint Mobile Stations (MSs) and the ping-pong movement phenomenon when handover roaming across different hotspots occurs, are considered. An analytic model is deve...

متن کامل

A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR

Next generation networks will comprise different wireless networks including cellular technologies, WLAN and indoor technologies. To support these heterogeneous environments, there is a need to consider a new design of the network infrastructure. Furthermore, this heterogeneous environment implies that future devices will need to roam between different networks using vertical handover technique...

متن کامل

Efficient authentication for fast handover in wireless mesh networks

We propose new authentication protocols to support fast handover in IEEE 802.11-based wireless mesh networks. The authentication server does not need to be involved in the handover authentication process. Instead, mesh access points directly authenticate mobile clients using tickets, avoiding multi-hop wireless communications in order to minimize the authentication delay. Numerical analysis and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCIT

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2009