Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.2.103

A Handover Authentication Scheme initiated by Mobile Node for Heterogeneous FMIPv6 Mobile Networks  

Choi, Jae-Duck (School of Electronic Engineering, Soongsil University)
Jung, Sou-Hwan (School of Electronic Engineering, Soongsil University)
Abstract
The existing handover authentication schemes have authentication delay and overhead of the authentication server since they have been separately studied handover authentication at the link layer and the network layer. This paper proposes a handover authentication scheme initiated by Mobile Node on FMIPv6 based mobile access networks. The main idea of the paper is to generate a session key at the mobile node side, and transfer it to the next Access Router through the authentication server. Also, the scheme has a hierarchical key management at access router. There are two advantages of the scheme. First, the generated session key can be utilized for protecting the binding update messages and also for access authentication. Second, hierarchical key management at the access router reduced the handover delay time. The security aspects on the against PFS, PBS, and DoS attack of proposed scheme are discussed.
Keywords
Handover Authentication; Network Access; Securing FBU; IEEE 802.11; FMIPv6;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Johnson, D., Perkins, C., and J. Arkko, 'Mobility Support in IPv6,' IETF RFC 3775, June 2004
2 C Koodli, R., 'Fast Handovers for Mobile IPv6,' IETF RFC 4068, July 2005
3 P. McCann, 'Mobile IPv6 Fast Handovers for 802.11 Networks,' IETF RFC 4260, November 2005
4 Patel, A., 'Authentication Protocol for Mobile IPv6,' IETF RFC 4285, January 2006
5 Aboba, B., 'Extensible Authentication Protocol (EAP),' IETF RFC 3748, June 2004
6 M. Yasuhiko, Ana Sanz M., S. Manish, S. Takashi, and Randy H. Katz, 'Secure authentication system for publie WLAN roaming,' ACM/WMASH, 2003
7 Arunesh Mishra, Min Ho Shin, Nick L. Petroni, Jr., T. Charles Clancy, and William A. Arbaugh, 'Proactive Key Distribution Using Neighbor Graphs,' IEEE Wireless Communications, February 2004
8 Heejin Jang, Junghoon Jee, Youn-Hee Han, Soohong Daniel Park, and Jaesun Cha, 'Mobile IPv6 Fast Handovers over IEEE 802.16e Networks,' IETF Internet Draft draft-ietf-mipshop-fh80216e-00, April 2006
9 Narayanan, V., 'Handover Keys Using AAA,' IETF Internet Draft draft-vidya-mipshophandover-keys-aaa-03, October 2006
10 S. Pack and Y. Choi, 'Fast handoff scheme based on mobility prediction in public wireless LAN systems,' IEE Proceedings Communications, October 2004
11 Aboba, B., 'Extensible Authentication Protocol (EAP) Key Management Framework,' IETF draft-ietf-eap-keying-15, October 2006
12 IEEE standard, 'Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands,' IEEE 802.16e, 2005
13 Anindo Mukherjee, Tarun Joshi, and Dharma P. Agrawal, 'Minimizing Reauthentication overheads in infrastructure IEEE 802.11 WLAN networks,' IEEE WCNC2005, 2005
14 IEEE standard, 'Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Medium Access Control (MAC) Security Enhancements,' IEEE 802.11i, 2004