Browse > Article

An Inter-provider Roaming Authentication and Key Establishment Protocol Providing Anonymity in IEEE 802.16e Networks  

Park, Young-Man (KT 인프라연구소)
Park, Sang-Kyu (한양대학교 전자통신컴퓨터공학부)
Abstract
In this Paper, we present a novel authentication and key exchange(AKE) protocol for inter-NSP(provider) roaming in IEEE 802.16e networks. The proposed protocol allows performing both user and device authentication jointly by using two different authentication credentials and Provides user anonymity and session key establishment. Also, this protocol requires only two round number message exchange between foreign network and home network.
Keywords
IEEE 802.16e; Roaming; Authentication; Anonymity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 B. Aboba, L. Blunk, and J. Vollbrecht, 'Extensible Authentication Protocol (EAP),' IETF RFC 3748, June 2004
2 U. Meyer, J. Cordasco, and S. Wetzel, 'An Approach to Enhance Inter-Provider Roaming Through Secret Sharing and its Application to WLANs,' Proceedings of The ACM Workshop on Wireless Mobile Applications and Services on WLAN Hotspots(WMAHS'05), September 2005
3 B. Aboba, M. Beadles, J. Arkko and P.Eronen, 'The Network Access Identifier,' IETF RFC 4282, December 2005
4 WiMax Forum Network Working Group Draft, 'WiMAX End-to-End Network Systems Architecture, Stage 2: Architecture Tenets, Reference Model and Reference Points ,' April 2005
5 WiMax Forum Network Working Group Draft, 'WiMAX End-to-End Network Systems Architecture, Stage 3: Detailed Protocols and Procedures,' April 2006
6 IEEE Std. 802.16e-2005, 'Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems,' February 2006
7 L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller, 'Efficient authentication and key distribution in Wireless IP networks,' IEEE Wireless Communications Magazine, 10(6), 2003
8 Guonin Yang, D.S.Wong, X.Deng, 'Efficient Anonymous Roaming and Its Security Analysis', Proceedings of the 3rd International Conference on Applied Cryptography and Network Security(ACNS2005), LNCS 3531, Springer-Verlag, 2005
9 A. Menezes, P. C. van Osrschot, and S. A. Vanstone, 'Handbook of Applied Cryptography', CRC Press, 1996
10 C. Rigney, S. Willens, A. Rubens, and W. Simpson, 'Remote Authentication Dial-In User Service (RADIUS),' IETF RFC 2865, June 2000