Browse > Article

A Fast Authentication based on Hierarchical Key Structure for Roaming Mobile Nodes Between Domains  

Hong, Ki-Hun (미 캘리포니아 주립대(데이비스) 컴퓨터학과)
Jung, Sou-Hwan (숭실대학교 정보통신전자공학부)
Abstract
This paper proposes a fast authentication scheme based on hierarchical key structure (HiFA) for roaming mobile nodes in both intra-domain and inter-domain. The full authentication procedure standardized in IEEE 802.11 and 802.16 is difficult to be applied to a handover since it needs a heavy operation and long delay time during a handover. Though a number of schemes were proposed to solve the problem, the existing schemes might degrade the security of authentication or impose heavy administrative burden on the Pome authentication server. The main contribution of this paper is to reduce the communication and computation overhead of the home authentication sewer without degrading the security strength of the fast roaming authentication using hierarchical authentication key structure. The proposed scheme iii this paper decentralizes the administrative burden of the home authentication server to other network entities such as a local authentication server or access point and supports the security separation of the authentication key among local authentication servers using hash key chain.
Keywords
Mobile networks; Authentication; Handover; Roaming;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. S. Bargh, R. J. Hulsebosch, E. H. Eertink, A. Prasad, H. Wang, P. Schoo, 'Fast Authentication Methods for Handovers between IEEE 802.11 Wireless LANs,' Proc. of WMASH'04, Oct. 2004
2 K. Hong, S. Jung, S. Felix Wu, 'A Hash-chain Based Authentication Scheme for Fast Handover in Wireless Network,' WISA 2005, LNCS 3786, pp. 96-107, Jan. 2006
3 IEEE standard, 'Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6,' IEEE 802.11i, 2004
4 H. Wang, A. R. Prasad, 'Fast Authentication for Inter-domain Handover,' ICT 2004, LNCS 3124, pp. 973-982, 2004
5 S. Pack, Y. Choi, 'Fast handoff scheme based on mobility prediction in public wireless LAN systems,' Communications, lEE Proceedings vol. 151, issue 5, pp. 489-495, Oct. 2004
6 A. Mishra, M. Shin, W. A. Arbauch, 'Context Caching using Neighbour Graphs for Fast Handoffs in a Wireless Network,' Proc. of IEEE INFOCOM, Hong Kong, Mar. 2004
7 IEEE standard, 'IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems,' IEEE 802.11f, 2003
8 A. Perrig, R. Canetti, J. D. Tygar, D. Song, 'Efficient Authentication and Signing of Multicast Streams over Lossy Channels,' Proc. of IEEE Security and Privacy Symposium S&P2000, May 2000
9 B. Aboba, D. Simon, 'PPP EAP TLS Authentication Protocol,' IETF RFC 2716, Oct. 1999
10 A. Mishra, M. Shin, N. L. Petroni, T. C. Clancy, W. A. Arbauch, 'Proactive key distribution using neighbor graphs,' IEEE Wireless Communications, vol. 11, issue 1, pp.26-36, 2004   DOI   ScienceOn