skip to main content
10.1145/1024733.1024741acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Fast authentication methods for handovers between IEEE 802.11 wireless LANs

Published:01 October 2004Publication History

ABSTRACT

Improving authentication delay is a key issue for achieving seamless handovers across networks and domains. This paper presents an overview of fast authentication methods when roaming within or across IEEE 802.11 Wireless-LANs. Besides this overview, the paper analyses the applicability of IEEE 802.11f and Seamoby solutions to enable fast authentication for inter-domain handovers. The paper proposes a number of possible changes to these solutions (typically in terms of network architectures and/or required trust relationships) for inter-domain operation. In addition, the paper identifies the crucial research issues therein. Possible solutions and directions for future research include: update to security infrastructure, inter-layer communication and discovery of appropriate networks.

References

  1. R. Stewart et.al, "Stream Control Transmission Protocol," IETF RFC 2960, Oct. 2000.Google ScholarGoogle Scholar
  2. J. Rosenberg et.al., "Session Initiation Protocol, baseline spec", IETF RFC3261, Jun. 2002.Google ScholarGoogle Scholar
  3. Y. Matsunage, A.S. Merino, T. Suzuki, R.H. Katz, "Secure Authentication System for Public WLAN Roaming", in Proc. of WMASH'03, San Diego, California, USA, Sep. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Liebsch, A. Singh (Editors), H. Chaskar, D. Funato, and E. Shim, "Candidate Access Router Discovery", IETF draft <draft-ietf-seamoby-card-protocol-06.txt>, exp. Jun. 2004.Google ScholarGoogle Scholar
  5. Port-Based Network Access Control, IEEE 802.1X, 2001.Google ScholarGoogle Scholar
  6. Draft Amendment to .. Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancement, IEEE Std 802.11i/D10.0, work in progress, July 2003.Google ScholarGoogle Scholar
  7. B. Aboba, D. Simon, J. Arkko and H. Levkowetz (Ed.), "EAP Key Management framework", IETF draft <draft-ietf-eap-keying-01.txt>, work in progress, expires: Apr. 2004.Google ScholarGoogle Scholar
  8. J. O. Vatn, "An experimental study of IEEE 802.11b handover performance and its effect on voice traffic," Telecommunication Systems Laboratory, Department of Microelectronics and Information Technology, KTH, Royal Institute of Technology, Stockholm, Sweden, Rep. TRITA-IMIT-TSLAB R 03:01, Jul. 2003.Google ScholarGoogle Scholar
  9. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE 802.11, 1999.Google ScholarGoogle Scholar
  10. B. Aboba. (2002, Jun. 17). "IEEE 802.1X Pre-authentication" {online}. Available <http://www.drizzle.com/~aboba/IEEE/11-02-TBDr0-I-Pre-Authentication.doc>.Google ScholarGoogle Scholar
  11. J. Manner AND M. Kojo, "Mobility Related Terminology", IETF draft <draft-ietf-seamoby-mobility-terminology-06.txt>, expires: Feb. 2004.Google ScholarGoogle Scholar
  12. O. Vatn and G.Q. Maguire Jr., "The effect of using co-located care-of addresses on macro handover latency," in Proc. of 14th Nordic Tele-traffic Seminar (NTS 14), Lyngby, Denmark, Aug. 1998.Google ScholarGoogle Scholar
  13. D. Johnson, C. Perkins, and J. Arkko, "Mobility Support in IPv6", IETF draft <draft-ietf-mobileip-ipv6-24.txt>, work in progress, Expires: Jun. 2003.Google ScholarGoogle Scholar
  14. E. Wedlund, and H. Schulzrinne, "Mobility Support Using SIP," in Proc of 2nd ACM/IEEE International Conference on Wireless and Mobile Multimedia (WoWMoM'99), Seattle, USA, Aug. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Pack and Y. Choi, "Fast Inter-AP Handoff using Predictive-Authentication Scheme in a Public Wireless LAN," in Proc. of Networks 2002 (Joint ICN 2002 and ICWLHN 2002), Aug. 2002.Google ScholarGoogle Scholar
  16. P. McCann, "Mobile Ipv6 fast handovers for 802.11 networks", IETF draft <draft-ietf-mipshop-80211fh-00.txt>, work in progress, expires: Aug. 2004.Google ScholarGoogle Scholar
  17. IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation, IEEE Std 802.11f, Jul. 2003.Google ScholarGoogle Scholar
  18. J. Loughney (editor), M. Nakhjiri, C. Perkins, and R. Koodli, "Context Transfer Protocol", Internet draft <draft-ietf-seamoby-ctp-08.txt>, work in progress, expires: Jul. 2004.Google ScholarGoogle Scholar
  19. W. Arbaugh and B. Aboba, "Experimental Handoff Extension to RADIUS," IETF draft <draft-irtf-aaaarch-handoff-01.txt>, work in progress, expires: Apr. 2003.Google ScholarGoogle Scholar
  20. A. Mishra, M. Shin, N.L. Petroni Jr., T.C. Clancy and W. Arbaugh, "Pro-active Key distribution using Neighbor Graphs," IEEE Wireless Comm. Magazine, Feb. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Mishra, M.H. Shin and W. A. Arbaugh, "Context Caching using Neighbour Graphs for Fast Handoffs in a Wireless Network," in Proc of IEEE INFOCOM, Hong Kong, Mar. 2004.Google ScholarGoogle Scholar

Index Terms

  1. Fast authentication methods for handovers between IEEE 802.11 wireless LANs

            Recommendations

            Reviews

            Jorge Jose Ortiz

            With the increase in wireless connectivity in public and private spaces comes new applications, dependent on a ubiquitous connection (for example, voice over Internet protocol (VOIP) and streaming video). In order to create ubiquitous connectivity, however, the wireless connection between mobile nodes (MNs) and access points (APs) must be handed over from AP to AP as the MN moves from one place to another. This paper elaborates on the security and efficiency of the handover process, and proposes changes in the IEEE 802.11 handover protocol on the link layer, and the Internet Engineering Task Force (IETF) Seamoby reconfiguration and network discovery protocol on the network layer. The paper starts by explaining the trust model, and the security relationships between the entities involved. The entities involved include APs, MNs, access routers (ARs), and authentication servers (ASs). There are implicit and explicit trust relationships, and the concept of old entities and new entities. The old entities are those connected to the MN currently, and the new entities are those that the MN moves to afterward. The implicit relationships exist between the MN and the new/old APs, and the MN and old AR. The explicit relationships exist between old/new AS servers, the MN and old AS, and the old/new AP and the old/new AR, respectively. Based on this trust model, the paper goes on to describe the associated handover process. Essentially, the process leverages the relationships set by the trust model, to relay sensitive information about MNs and APs for intra- and inter-domain handover and authentication. In providing an overview of the handover process, the paper essentially breaks down how the trust relationships are established through a distribution of keys. On the link layer (L2), the MN has an explicit trust relationship with the AS. They use a scheme to establish a master key (MK), and from this they derive a pairwise master key (PMK) that is forwarded to the AP that the MN is currently trying to establish an initial connection with. The MN and the AP then derive a pairwise transient key (PTK) to establish secure communication between them. They then establish a group transient key (GTK) that is handed out to all associated APs. This establishes trust between the MN, AS, and APs. The network layer (L3) trust is established from the trust between the MN and AP. When the MN moves to another AP (nAP) from the old AP (oAP), the MN establishes trust with the nAP from the GTK that was sent to it by the oAP, and then it re-associates with the nAP. Trust with the nAR is established through transitivity (for example, MN trusts nAP, nAP trusts nAR, and MN trusts nAR). Fast authentication is described in the section following the protocol section. One of the proposed techniques was proactive key distribution, whereby the AS calculates the nearest neighbors to the current AP the MN is connected to. In summary, the AS re-calculates PMKs for all of the oAP's neighbors. That way, when the MN goes to a nAP, they can skip the step of obtaining a PMK from the AS, as was described in the previous paragraph. The paper notes that this sped up the handover process from 1.1 seconds to 25 milliseconds. The next proposed solution is preauthentication. Basically, the MN authenticates itself to a nAP through the oAP. That way, the MN is now authenticated to the nAP while still connected to the oAP. When the MN finally moves to the nAP, they can start by deriving the GTK, and the MN can continue this procedure as it moves from AP to AP. Predictive authentication is another technique for fast authentication. Here, the AS sends the PMK response to multiple APs, in the location where the MN's home AP is detected to be. The process is similar to the nearest neighbor method in proactive key distribution. These fast authentication techniques are then expanded to inter-domain handovers, by creating a trusted relationship between APs of different domains. In intra-domain handovers, the APs inherently trust each other, as they all trust the same AR and/or AS. The problem in inter-domain handovers is that everything changes. The APs, ARs, and AS all change. If you can create a trust relationship between the ASs of different domains, then the same fast authentication techniques can be used. Some architectural changes are proposed as well, and are further expanded in the last section of the paper. Overall, the paper is generally well written, but difficult to follow. In the paper, as is probably true of this review, the use of acronyms and abbreviations make the procedures and protocols hard to understand at first glance. I read the paper twice before I started to get a clear idea of how the protocols worked. In summary, the organization of topics is well constructed, and the techniques are clearly explained. The use of abbreviations, while seemingly adding to the reading difficulty, actually does the opposite. Surely, if the terms were expanded, the paper would be tougher to understand. The future work section does not really go into what future work can be done, and what direction research is taking. Last, it would be interesting to test these techniques, and see their affect on real applications like VOIP. Online Computing Reviews Service

            Access critical reviews of Computing literature here

            Become a reviewer for Computing Reviews.

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              WMASH '04: Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
              October 2004
              156 pages
              ISBN:1581138776
              DOI:10.1145/1024733

              Copyright © 2004 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 October 2004

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader