Fast and Secure Handover Schemes Based on Proposed WiMAX over EPON Network Security Architecture

نویسندگان

  • WEN GU
  • STAMATIOS V. KARTALOPOULOS
  • PRAMODE K. VERMA
چکیده

In recent years, the integration of Worldwide Interoperability for Microwave Access (WiMAX) and Ethernet Passive Optical Network (EPON) has become one of the most promising broadband access solutions. The EPON network provides tremendous bandwidth while the WiMAX network can support mobility. Integration of PON and WiMAX combines the best of both technologies. However, the integration requires advanced secure mechanisms to overcome vulnerabilities of wireless mobile protocols. In this paper, we propose an end-to-end network architecture based on WiMAX over EPON networks, and we present a security framework that adopts the RSA protocol and the Extensible Authentication Protocol (EAP). We introduce three handover scenarios in the integrated network and propose the corresponding handover schemes. In the proposed handover schemes, we utilize a pre-authentication method for the authorization key (AK) pre-distribution, and we use the communication framework of the ranging step to implement mutual authentication between the subscriber and the mobile network. Through our analysis, we show that the proposed handover mechanisms can simplify and accelerate the handover process compared to the standard WiMAX handover scheme while keeping the handover procedure secure. Key-Words: WiMAX over EPON, Handover Security, Pre-authentication, Ranging

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure and Efficient Handover Schemes for WiMAX over EPON networks

In this paper, we propose an end-to-end network architecture based on Worldwide Interoperability for Microwave Access (WiMAX) over Ethernet Passive Optical Network (EPON) and present a security framework adopting both RSA and Extensible Authentication Protocol (EAP) authentication. We also introduce handover scenarios in the integrated network and propose corresponding handover schemes, for whi...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Analysis of Packet Loss and Latency Control for Robust IPTV over Mobile WiMAX and LTE Assessment (RESEARCH NOTE)

Abstract   The streamed audio video (AV) content for IPTV across mobile WiMAX channel, the different schemes were discussed to reduce the noise, packet loss and latency. The objective of this paper is to verify the effectiveness of forward error correction (FEC) techniques and to suggest the techniques for robustness problems and to analysis the issues either due to AV coding encoding or due to...

متن کامل

Mobile WiMAX Network Security

WiMAX networks provide broadband data access to mobile as well as stationary users. While the wireless link is based on the 802.16e-2005 specification developed by IEEE, a complete network architecture “behind the base station” with global roaming support has been specified by the WiMAX forum. The security architecture for these networks covers EAP/AAA-based secure network access, secure bootst...

متن کامل

A Fast Authentication Scheme for WiMAX-WLAN Vertical Handover

In view that authentication has made a significant determinant in handover delay, this paper presents a fast authentication mechanism for mobile stations roaming within a WiMAX–WLAN interconnected environment. Incorporating a key reuse design that prevents repeated transactions at a remote server, our mechanism distributes security contexts ahead of handover to a local trusted key holder which ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010