Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation

نویسندگان

  • Men Long
  • Chwan-Hwa John Wu
  • J. David Irwin
چکیده

The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authentication methods that demonstrate better performance in terms of authentication latency and energy consumption of a mobile terminal, compared to the 3G cellular network approach of home network transporting authentication vector to visited network. The proposed Method I, referred to as Nonce-based Authentication, eliminates the sequence numbers used in the 3G roaming authentication and employs the key derivation and caching technique for mobile terminal and visited network. The proposed Method II, called Lightweight Localized Authentication, introduces the computation-efficient protocol based on a carefully designed public key certificate infrastructure. With the design goal of achieving security by lower cost, both methods significantly reduce the communication overhead between home and visited networks for roaming authentication, as indicated by analytical and experimental result.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks

In wireless mesh networks (WMNs), re-authentication guarantees the secure association between a roaming mesh host (MH) and a target mesh access point (MAP) in handoff process. However, due to the complex security mechanisms in re-authentication procedure, handoff delay is significantly extended, making it harder to guarantee the quality of service (QoS) of some mesh applications. In this paper,...

متن کامل

Enhanced Wired Equivalent Privacy for IEEE 802.11 Wireless LANs

The Wired Equivalent Privacy (WEP) is defined as part of the IEEE 802.11 standard to provide secure communication over a wireless channel. However, it suffers serious security flaws, such as the vulnerability of RC4 to keystream reuse and the misuse of CRC checksum in ensuring data integrity. In this paper, we design, implement, and evaluate a software (middleware) approach, which runs on top o...

متن کامل

Fast Pre-authentication with Minimized Overhead and High Security for WLAN Handoff

User mobility in WLANs becomes more and more popular because of wide deployment of WLANs and numerous applications on it. Some of these applications, for example multimedia applications, require fast handoffs among access points to maintain the quality of service. In order to support multimedia applications for roaming users, IEEE 802.11i defines pre-authentication to reduce the re-authenticati...

متن کامل

Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems

In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2008