Browse > Article

A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments  

Chae, Kang-Suk (숭실대학교 정보통신전자공학부)
Choi, Jae-Duck (ETRI 부설연구소)
Jung, Sou-Hwan (숭실대학교 정보통신전자공학부)
Abstract
This paper proposes a proactive authentication scheme using credentials based on chameleon hashing in MIH environments. There is a proactive authentication structure defined by IEEE 802.21 Security Study Group for the link access in MIH environment. Both schemes based on EAP and on PKI can be applied to such structure, but the former has caused network traffic due to the complicated authentication procedure and the latter has complex structure for managing certificates. The proposed scheme performs the proactive authentication procedure only between a mobile node and a MIH Key Holder by using credentials based on chameleon hashing. Our scheme reduces the network traffic since authentication with the server is unnecessary in MIH environment and PKI structure is not required as well. In addition, the proposed scheme provides secure PFS and PBS features owing to the authenticated Diffie-Hellman key exchange of the chameleon-based credential.
Keywords
Chameleon Hashing; Pre-Authentication; MIH; Vertical Handover; Diffie-Hellman;
Citations & Related Records
연도 인용수 순위
  • Reference
1 IEEE Std 802.21TM-2008, IEEE Standard for Local and metropolitan area networks- Part 21: Media Independent Handover Services, January, 2009.
2 IEEE 802.21a, "Proactive Authentication and MIH Security," 21-09-0102-03-0Sec, November, 2009.
3 B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, Extensible Authentication Protocol (EAP), IETF RFC 3748, June, 2004.
4 IEEE Std 802.11iTM-2004, IEEE Standard for Information technology - Telecommunic- ations and information exchange between systems - Local and metropolitan area networks - Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) speci- fications Amendment 6: Medium Access Control (MAC) Security Enhancements, July, 2004.
5 S. Eum, and H. Choi, "EAP-Kerberos II: An Adaptation of Kerberos to EAP for Mutual Authentication," in Proc. ITST 2008, Oct., 2008.
6 V. Narayanan, and L. Dondeti, EAP Extensions for EAP Re-authentication Protocol (ERP), IETF RFC 5296, August, 2008.
7 J. Salowey, L. Dondeti, V. Narayanan, and M. Nakhjiri, Specification for the Drivation of Root Keys from an Extended Master Session Key (EMSK), IETF RFC 5295, August, 2008.
8 H. Sun, Y. Lin, S. Chen, and Y. Shen, "Secure and Fast Handover Scheme Based on Pre- Authentication method for 802.16 / WiMAX Infrastructure Networks," in Proc. TENCON 2007, Oct., 2007.
9 H. Krawczyk, and T. Rabin, "Chameleon Signatures," in Proc. NDSS 2000, pp.143-154, 2000.
10 J. Choi, and S. Jung, "A Handover Authentication Using Credentials Based on Chameleon Hashing," IEEE Communications Letters, Vol.14, No.1, Jan., 2010.
11 W. Diffie, and M. Hellman, "New Directions in Cryptograhpy," IEEE Transactions on Information Theory, Vol.22, No.6, pp.644-654, Nov., 1976.   DOI