An Efficient and Secure Handover Protocol for IEEE 802.16m Networks
نویسنده
چکیده
Mobile WiMAX (Worldwide Interoperability Microwave Access) requires the re-authentication of mobile stations as they change from one base station to another. IEEE 802.16e uses the Extensible Authentication Protocol (EAP) for authentication and key management. This requires about 1000 ms, therefore, it could not support mobile WiMAX applications such as video conference. In the present paper, we propose a protocol that aims to overcome the inter-domain handover problem. The proposed protocol uses the EAP protocol for authentication and key distribution. The proposed protocol is based on the use of hash functions and the Diffie-Hellman protocol to distribute the keys and to avoid the domino effect. The proposed protocol is analyzed using the BAN logic to ensure that it achieves the goals of authentication and key distribution. Furthermore, the proposed protocol is compared with other handover protocols. The comparison shows that proposed protocol outperforms the other protocols.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملAn Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover
IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of th...
متن کاملFast Handover with Privacy Preserving Authentication Protocol for Mobile WiMAX Networks
In this paper, we propose new fast handover authentication scheme with privacy preservation to improve the capabilities of IEEE 802.16m network. New metric is presented for handover authentication protocols in wireless networks. It’s the required time for base station and mobile station to detect the undesirable messages. We propose a new scheme which gives a minimum time of detection to these ...
متن کاملAn Energy Efficient Clustering Method using Bat Algorithm and Mobile Sink in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of sensor nodes with limited energy. Energy efficiency is an important issue in WSNs as the sensor nodes are deployed in rugged and non-care areas and consume a lot of energy to send data to the central station or sink if they want to communicate directly with the sink. Recently, the IEEE 802.15.4 protocol is employed as a low-power, low-cost, and low rat...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کامل