Managing Handover Authentication in Big-domain Wireless Environment
نویسندگان
چکیده
Mobility management is the key feature of wireless network. When the mobile node roams from the home network to the foreign network, the foreign network access server usually does not have the security material of the mobile node, and can not authenticate the mobile node by itself. Thus the three-party authentication is used, and the foreign network access server consults the home authentication server of the mobile node for authentication (usually through the foreign authentication server). However, this sort of authentication will lead to a long latency. With the wide deployment of latency sensitive services in wireless network, the handover authentication latency becomes more and more flagrant. Currently, many standards organizations are working on this issue, and they defined a lot of protocols for optimizing the handover authentication procedure. These protocols mainly include the fast re-authentication protocol, the pre-authentication protocol and the context transfer based authentication protocol. However, current protocols will put a heavy burden on the authentication server in big domain, and thus add a long latency to the handover authentication procedure. This paper presents an elliptic curve based authenticated key agreement protocol with mutual authentication property to address this problem.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملOSNP: Secure wireless authentication protocol using one-time key
Handover security and efficiency have become more and more important in modern wireless network designs. In this paper, we propose a new protocol using the one-time key for user authentication. The proposed protocol can support both intra-domain and interdomain authentications efficiently. Our protocol requires five messages for intra-domain initial authentication; three for subsequent authenti...
متن کاملA novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
In the paper, we propose an efficient two-factor localised authentication scheme for inter-domain handover and roaming in IEEE 802.11 based service-oriented wireless mesh networks (WMNs). Some important aspects, such as resource-constraint Mobile Stations (MSs) and the ping-pong movement phenomenon when handover roaming across different hotspots occurs, are considered. An analytic model is deve...
متن کاملA formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR
Next generation networks will comprise different wireless networks including cellular technologies, WLAN and indoor technologies. To support these heterogeneous environments, there is a need to consider a new design of the network infrastructure. Furthermore, this heterogeneous environment implies that future devices will need to roam between different networks using vertical handover technique...
متن کاملEfficient authentication for fast handover in wireless mesh networks
We propose new authentication protocols to support fast handover in IEEE 802.11-based wireless mesh networks. The authentication server does not need to be involved in the handover authentication process. Instead, mesh access points directly authenticate mobile clients using tickets, avoiding multi-hop wireless communications in order to minimize the authentication delay. Numerical analysis and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCIT
دوره 4 شماره
صفحات -
تاریخ انتشار 2009