Skip to main content
Erschienen in: Mobile Networks and Applications 3/2016

01.06.2016

Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks

verfasst von: Gunasekaran Raja, Sheeba Backia Mary Baskaran, Dipak Ghosal, Jayashree Padmanabhan

Erschienen in: Mobile Networks and Applications | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The authentication mechanisms in Broadband Wireless Networks (BWN) are predominantly based on Extensible Authentication Protocol (EAP). However, the complexity of EAP causes an impediment in BWN networks which involve high speed mobility. Even though it provides a highly secured mechanism, the current authentication process has high authentication overheads which affect the Quality of Service (QoS) in time sensitive data applications such as VoIP and VoD. The alternative would be to consider re-authentication approach which reduces the number of full EAP authentications but at the same time provides a secure handoff to the mobile users at a lower latency and hence does not impact the QoS of the applications. The proposed Frequency-based Re-authentication Protocol (FRP) is an extension to EAP, aiming to reduce the network access time and in turn reduce the authentication latency, by taking into account the frequency of visits of a particular mobile user to an access domain. In addition, we also propose a frequent – User Authentication Process (f-UAP) which when used with FRP significantly minimizes the EAP authentication overhead. A mathematical model is formulated to illustrate the tradeoff achieved when FRP along with EAP is used in the f-UAP approach. The security evaluation of the proposed FRP is carried out using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Furthermore, simulation analysis show that the FRP authentication latency is lower compared to the existing re-authentication mechanisms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Miguel PL, Shiwen M, Frank S, Jen S, Thomas M, Raheem A, Scott M (2010) Advances in wireless test beds and research infrastructures, mobile network applications (MONET), springer, 15:311–314 Miguel PL, Shiwen M, Frank S, Jen S, Thomas M, Raheem A, Scott M (2010) Advances in wireless test beds and research infrastructures, mobile network applications (MONET), springer, 15:311–314
2.
Zurück zum Zitat David QL, Mark C (2008) Extensible authentication protocols for IEEE standards 802.11 and 802.16. In: Proc. ACM The International Conference on Mobile Technology, Applications & Systems, ACM, Article No.47 David QL, Mark C (2008) Extensible authentication protocols for IEEE standards 802.11 and 802.16. In: Proc. ACM The International Conference on Mobile Technology, Applications & Systems, ACM, Article No.47
3.
Zurück zum Zitat Xu Q, Wan C, Hu A (2008) The performance analysis of fast EAP re-authentication protocol. Proc IEEE Int Conf Comput Sci Comput Technol 1:99–103 Xu Q, Wan C, Hu A (2008) The performance analysis of fast EAP re-authentication protocol. Proc IEEE Int Conf Comput Sci Comput Technol 1:99–103
4.
Zurück zum Zitat Nguyen TN, Ma M (2012) Enhanced EAP-based Pre-authentication for fast and secure inter-ASN handovers in mobile WiMAX networks. IEEE Trans Wirel Commun 11(6):2173–2181CrossRef Nguyen TN, Ma M (2012) Enhanced EAP-based Pre-authentication for fast and secure inter-ASN handovers in mobile WiMAX networks. IEEE Trans Wirel Commun 11(6):2173–2181CrossRef
5.
Zurück zum Zitat Junbeom H, Hyeongseop S, Pyung K, Hyunsoo Y, Nah-Oak S (2008) Security considerations for handover schemes in mobile WiMAX networks. In: Proc. IEEE Wireless Communications and Networking Conference, IEEE, pp 2531–2536 Junbeom H, Hyeongseop S, Pyung K, Hyunsoo Y, Nah-Oak S (2008) Security considerations for handover schemes in mobile WiMAX networks. In: Proc. IEEE Wireless Communications and Networking Conference, IEEE, pp 2531–2536
6.
Zurück zum Zitat Ahmed M. T, Abdel-Hamid AT, Sofiene T (2009) Formal analysis of the handover schemes in mobile WiMAX Networks. Proc. IEEE IFIP International Conference on Wireless and Optical Communications Networks, IEEE, pp 1–5 Ahmed M. T, Abdel-Hamid AT, Sofiene T (2009) Formal analysis of the handover schemes in mobile WiMAX Networks. Proc. IEEE IFIP International Conference on Wireless and Optical Communications Networks, IEEE, pp 1–5
7.
Zurück zum Zitat Daojing H, Chun C, Jiajun B (2013) Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects. Commun Mag IEEE 51(2):142–150CrossRef Daojing H, Chun C, Jiajun B (2013) Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects. Commun Mag IEEE 51(2):142–150CrossRef
8.
Zurück zum Zitat Ahmed MT, Abdel-Hamid AT, Sofiene T (2009) Formal analysis of the handover schemes in mobile WiMAX networks. In: Proc. IEEE International Conference on Wireless and Optical Communications Networks, IEEE, pp 1–5 Ahmed MT, Abdel-Hamid AT, Sofiene T (2009) Formal analysis of the handover schemes in mobile WiMAX networks. In: Proc. IEEE International Conference on Wireless and Optical Communications Networks, IEEE, pp 1–5
9.
Zurück zum Zitat Sreejesh S, Sebastian MP (2010) A revised secure authentication protocol for IEEE 802.16 (e). In: Proc. IEEE International conference on advances in computer engineering (ACE), IEEE, pp 34–38 Sreejesh S, Sebastian MP (2010) A revised secure authentication protocol for IEEE 802.16 (e). In: Proc. IEEE International conference on advances in computer engineering (ACE), IEEE, pp 34–38
10.
Zurück zum Zitat Brandon M, ChengCheng L (2013) A survey of the security and threats of the IMT-advanced requirements for 4G standards. In: Proc. Conference Anthology, IEEE, pp:1–5 Brandon M, ChengCheng L (2013) A survey of the security and threats of the IMT-advanced requirements for 4G standards. In: Proc. Conference Anthology, IEEE, pp:1–5
11.
Zurück zum Zitat Constantinos K, Georgios K, Stefanos G (2013) Attacks and countermeasures on 802.16: analysis and assessment, communications surveys & tutorials, IEEE, 15(1): 487–514 Constantinos K, Georgios K, Stefanos G (2013) Attacks and countermeasures on 802.16: analysis and assessment, communications surveys & tutorials, IEEE, 15(1): 487–514
12.
Zurück zum Zitat Vinod KJ, Vrijendra S (2014) Mobile WiMAX network security threats and solutions: a survey, In. Proc. IEEE international conference on computer and communication technology, IEEE, PP: 135–140 Vinod KJ, Vrijendra S (2014) Mobile WiMAX network security threats and solutions: a survey, In. Proc. IEEE international conference on computer and communication technology, IEEE, PP: 135–140
13.
Zurück zum Zitat Network Working Group (2006) RFC:4187, Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA). January Network Working Group (2006) RFC:4187, Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA). January
14.
Zurück zum Zitat Xinghua L, Xiang L, Jianfeng M, Zhenfang Z, Li X, YoungHo P (2011) Authentications and key management in 3G-WLAN interworking, mobile networks and applications (MONET), Springer, 16(3):394–407 Xinghua L, Xiang L, Jianfeng M, Zhenfang Z, Li X, YoungHo P (2011) Authentications and key management in 3G-WLAN interworking, mobile networks and applications (MONET), Springer, 16(3):394–407
15.
Zurück zum Zitat Marin-Lopez R, Pereniguez F, Bernal F, Gomez AF (2010) Secure three-party key distribution protocol for fast network access in EAP-based wireless networks. J Comput Networks 54(15):2651–2673, Elsevier PublicationsCrossRefMATH Marin-Lopez R, Pereniguez F, Bernal F, Gomez AF (2010) Secure three-party key distribution protocol for fast network access in EAP-based wireless networks. J Comput Networks 54(15):2651–2673, Elsevier PublicationsCrossRefMATH
16.
Zurück zum Zitat Shidhani AAL, Leung VCM (2011) Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN Handovers”, IEEE transactions on dependable and secure computing, 8(5):699–713 Shidhani AAL, Leung VCM (2011) Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN Handovers”, IEEE transactions on dependable and secure computing, 8(5):699–713
17.
Zurück zum Zitat Chrabaszcz R, Pacyna P (2012) Fast re-authentication of mobile devices with EAP Re-authentication protocol (ERP). In: Proc. IEEE XVth international conference on telecommunications network strategy and planning, IEEE, pp 1–6 Chrabaszcz R, Pacyna P (2012) Fast re-authentication of mobile devices with EAP Re-authentication protocol (ERP). In: Proc. IEEE XVth international conference on telecommunications network strategy and planning, IEEE, pp 1–6
18.
Zurück zum Zitat Network Working Group (2011) Internet-draft, architecture for fast EAP re-authentication based on a new EAP method (EAP-FRM) working on standalone mode. September Network Working Group (2011) Internet-draft, architecture for fast EAP re-authentication based on a new EAP method (EAP-FRM) working on standalone mode. September
19.
Zurück zum Zitat Lin S-H, Chiu J-H, Lee G-R (2010) A fast iterative localized Re-authentication protocol for heterogeneous mobile networks. IEEE Trans Consum Electron 56(4):2267–2275CrossRef Lin S-H, Chiu J-H, Lee G-R (2010) A fast iterative localized Re-authentication protocol for heterogeneous mobile networks. IEEE Trans Consum Electron 56(4):2267–2275CrossRef
20.
Zurück zum Zitat Shidhani AA, Leung VCM (2007) Local fast re-authentication protocol for 3G-WLAN interworking architecture. In: Proc. IEEE conference on wireless telecommunications symposium, IEEE, pp 1–8 Shidhani AA, Leung VCM (2007) Local fast re-authentication protocol for 3G-WLAN interworking architecture. In: Proc. IEEE conference on wireless telecommunications symposium, IEEE, pp 1–8
21.
Zurück zum Zitat Madjid N (2007) Use of EAP-AKA, IETF HOKEY and AAA mechanisms to provide access and handover security and 3G-802.16 m interworking. In: Proc. IEEE 18th international symposium on personal, indoor and mobile radio communications, IEEE, pp 1–5 Madjid N (2007) Use of EAP-AKA, IETF HOKEY and AAA mechanisms to provide access and handover security and 3G-802.16 m interworking. In: Proc. IEEE 18th international symposium on personal, indoor and mobile radio communications, IEEE, pp 1–5
22.
Zurück zum Zitat Chengzhe L, Hui L, Yueyu Z, Jin C (2013) Simple and Low-cost Re-authentication protocol for HeNB. IEEE China Commun 10(1):105–115CrossRef Chengzhe L, Hui L, Yueyu Z, Jin C (2013) Simple and Low-cost Re-authentication protocol for HeNB. IEEE China Commun 10(1):105–115CrossRef
23.
Zurück zum Zitat Ye Y, Jiannong C, Chuda L, Seong WK, Weigang W (2009) A dual re-authentication scheme for fast handoff in IEEE 802.11 wireless mesh networks. In: Proc. IEEE wireless communications and networking conference, IEEE, pp 1–5 Ye Y, Jiannong C, Chuda L, Seong WK, Weigang W (2009) A dual re-authentication scheme for fast handoff in IEEE 802.11 wireless mesh networks. In: Proc. IEEE wireless communications and networking conference, IEEE, pp 1–5
24.
Zurück zum Zitat Hsu S-F, Lin Y-B (2009) A Key caching mechanism for reducing WiMAX authentication cost in handoff. IEEE Trans Veh Technol 58(8):4507–4513CrossRef Hsu S-F, Lin Y-B (2009) A Key caching mechanism for reducing WiMAX authentication cost in handoff. IEEE Trans Veh Technol 58(8):4507–4513CrossRef
25.
Zurück zum Zitat Anantha NV, Suresh K, Rajeswari A (2014) Enhanced fast iterative localized re-authentication protocol for UMTS-WLAN interworking. In: Proc. IEEE international conference on electronics and communication systems, IEEE, pp: 1–5 Anantha NV, Suresh K, Rajeswari A (2014) Enhanced fast iterative localized re-authentication protocol for UMTS-WLAN interworking. In: Proc. IEEE international conference on electronics and communication systems, IEEE, pp: 1–5
26.
Zurück zum Zitat Song M, Wang L, Huang J, Song J (2009) An optimal interworking authentication scheme based on EAP-AKA for heterogeneous access networks. In: Proc. IEEE canadian conference on electrical and computer engineering, IEEE, pp 794–797 Song M, Wang L, Huang J, Song J (2009) An optimal interworking authentication scheme based on EAP-AKA for heterogeneous access networks. In: Proc. IEEE canadian conference on electrical and computer engineering, IEEE, pp 794–797
27.
Zurück zum Zitat Kim Y, Bahk S (2008) Enhancing security using the discarded security information in mobile WiMAX networks. In: Proc. IEEE Global Telecommunications Conference, IEEE, pp 1–5 Kim Y, Bahk S (2008) Enhancing security using the discarded security information in mobile WiMAX networks. In: Proc. IEEE Global Telecommunications Conference, IEEE, pp 1–5
29.
Zurück zum Zitat Rafal C, Piotr P (2012) Fast re-authentication of mobile devices with EAP Re-authentication Protocol (ERP). In: Proc. IEEE XVth international conference on telecommunications network strategy and planning symposium (NETWORKS), IEEE, pp 1–6 Rafal C, Piotr P (2012) Fast re-authentication of mobile devices with EAP Re-authentication Protocol (ERP). In: Proc. IEEE XVth international conference on telecommunications network strategy and planning symposium (NETWORKS), IEEE, pp 1–6
30.
Zurück zum Zitat Anmin F, Yuqing Z, Zhenchao Z, Xuefeng L (2010) A fast handover authentication mechanism based on ticket for IEEE 802.16 m. Commun Lett IEEE 14(12):1134–1136CrossRef Anmin F, Yuqing Z, Zhenchao Z, Xuefeng L (2010) A fast handover authentication mechanism based on ticket for IEEE 802.16 m. Commun Lett IEEE 14(12):1134–1136CrossRef
31.
Zurück zum Zitat Rengaraju P, Lung C-H, Srinivasan A (2014) QoS-aware distributed security architecture for 4G multihop wireless networks. IEEE Trans Veh Technol 63(6):2886–2900CrossRef Rengaraju P, Lung C-H, Srinivasan A (2014) QoS-aware distributed security architecture for 4G multihop wireless networks. IEEE Trans Veh Technol 63(6):2886–2900CrossRef
32.
Zurück zum Zitat Aura T, Roe M (2005) Reducing reauthentication delay in wireless networks. In: Proc. IEEE first international conference on security and privacy for emerging areas in communications networks, IEEE, pp 139–148 Aura T, Roe M (2005) Reducing reauthentication delay in wireless networks. In: Proc. IEEE first international conference on security and privacy for emerging areas in communications networks, IEEE, pp 139–148
33.
Zurück zum Zitat Antonio I, Nada G, Katrin H, Lidong C (2008) Using the EAP framework for fast media independent handover authentication. In: Proc. ACM WICON ’08 proceedings of the 4th annual international conference on wireless internet, ACM, Article No. 42 Antonio I, Nada G, Katrin H, Lidong C (2008) Using the EAP framework for fast media independent handover authentication. In: Proc. ACM WICON ’08 proceedings of the 4th annual international conference on wireless internet, ACM, Article No. 42
34.
Zurück zum Zitat Wu L-Y, Lin Y-B (2007) Authentication vector management for UMTS”. IEEE Trans Wirel Commun 6(11):4101–4107CrossRef Wu L-Y, Lin Y-B (2007) Authentication vector management for UMTS”. IEEE Trans Wirel Commun 6(11):4101–4107CrossRef
35.
Zurück zum Zitat Lin Y-B, Chen Y-K (2003) Reducing authentication signaling traffic in third generation mobile network. IEEE Trans Wirel Commun 2(3):493–501CrossRef Lin Y-B, Chen Y-K (2003) Reducing authentication signaling traffic in third generation mobile network. IEEE Trans Wirel Commun 2(3):493–501CrossRef
36.
Zurück zum Zitat El Hajjaji El Idrissi Y, Zahid N, Mohamed JM. (2013) A new fast re-authentication method for the 3G-WLAN interworking based on EAP-AKA. In: Proc. IEEE 20th international conference on telecommunications, IEEE, pp 1–5 El Hajjaji El Idrissi Y, Zahid N, Mohamed JM. (2013) A new fast re-authentication method for the 3G-WLAN interworking based on EAP-AKA. In: Proc. IEEE 20th international conference on telecommunications, IEEE, pp 1–5
37.
Zurück zum Zitat Ahmad S, Mir AH, Beigh GR (2011) Latency evaluation of extensible authentication protocols in WLANs. In: Proc. IEEE 5th international conference on advanced networks and telecommunication systems, IEEE, pp 1–5 Ahmad S, Mir AH, Beigh GR (2011) Latency evaluation of extensible authentication protocols in WLANs. In: Proc. IEEE 5th international conference on advanced networks and telecommunication systems, IEEE, pp 1–5
38.
Zurück zum Zitat Younes EHEI, Noureddine Z, Mohamed J (2012) Security analysis of 3GPP (LTE) - WLAN interworking and a new local authentication method based on EAP-AKA. In: Proc. IEEE international conference on future generation communication technology, IEEE, PP: 137–142 Younes EHEI, Noureddine Z, Mohamed J (2012) Security analysis of 3GPP (LTE) - WLAN interworking and a new local authentication method based on EAP-AKA. In: Proc. IEEE international conference on future generation communication technology, IEEE, PP: 137–142
39.
Zurück zum Zitat Munoz A, Mana A, Serrano D (2009) AVISPA in the validation of ambient intelligence scenarios. In: Proc. IEEE international conference on availability, reliability and security, IEEE, pp 420–426 Munoz A, Mana A, Serrano D (2009) AVISPA in the validation of ambient intelligence scenarios. In: Proc. IEEE international conference on availability, reliability and security, IEEE, pp 420–426
41.
Zurück zum Zitat Rai AK, Kumar V, Mishra S (2011) An efficient password authenticated key exchange protocol for WLAN and WIMAX. In: Proc. ACM international conference and workshop on emerging trends in technology (ICWET’11) Rai AK, Kumar V, Mishra S (2011) An efficient password authenticated key exchange protocol for WLAN and WIMAX. In: Proc. ACM international conference and workshop on emerging trends in technology (ICWET’11)
42.
Zurück zum Zitat Cao J, Ma M-D, Li H (2013) Handover authentication between different types of eNBs in LTE networks. The Journal of China Universities of Posts and Telecommunications, Elsevier, pp 106–112 Cao J, Ma M-D, Li H (2013) Handover authentication between different types of eNBs in LTE networks. The Journal of China Universities of Posts and Telecommunications, Elsevier, pp 106–112
Metadaten
Titel
Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks
verfasst von
Gunasekaran Raja
Sheeba Backia Mary Baskaran
Dipak Ghosal
Jayashree Padmanabhan
Publikationsdatum
01.06.2016
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 3/2016
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-015-0642-z

Weitere Artikel der Ausgabe 3/2016

Mobile Networks and Applications 3/2016 Zur Ausgabe

Neuer Inhalt