Browse > Article

A Scalable Authentication Framework for Fast Remote Roaming with Hierarchical Caching  

Lee Heejin (서울대학교 전기 컴퓨터공학부)
Song Yu-Kyong (서울대학교 전기 컴퓨터공학부)
Rhee Myung Soo (KT 정보보호단)
Kim Chong-Kwon (서울대학교 전기 컴퓨터공학부)
Abstract
As the demand on ubiquitous communication increases, global roaming and vertical handover will be prevailing in the near future. Since this environment is accompanied by the frequent handovers at remote sites, a scalable and fast authentication becomes prerequisite for ubiquitous communication. In this paper, we suggest a framework for scalable and fast authentication, using hierarchical caching based on general trust relationship among domains. At the end, we show that the proposed scheme achieves reduced authentication delay and network overhead through an analytic method with fluid flow model.
Keywords
Authentication; international roaming; vertical handover; fast handover; scalability; SSO; general trust relationship;
Citations & Related Records
연도 인용수 순위
  • Reference
1 B. Yao and W. K. Fuchs, 'Proxy-based Recovery for Applications on Wireless Hand-held Devices'. In Proc. 19th IEEE Symposium on Reliable Distributed Systems SRDS'00), October 16- 18, 2000, pp. 2.10   DOI
2 B. Yao and W.K. Fuchs. 'Recovery Proxy for Wireless Application'. In Proc. 12th International Symposium on Software Reliability Engineering (ISSRE 2001), IEEE, pp. 112-119, 2001
3 Fumiko Satoh, Takayuki Itoh, 'Single Sign On Architecture with Dynamic Tokens,' SAINT, 2004   DOI
4 Arkko, J. and Haverinen, H., 'EAP AKA Authentication,' Internet draft, dratt-arkko-pppext-eap-aka-12, Apr. 2004
5 Haverinen, H., 'EAP SIM Authentication,' Internet draft, draft-haverinen-pppext-eap-sim-13, Apr. 2004
6 Samar Vipin, 'Single Sign-On Using Cookies for Web Applications,' WETICE, 1999
7 Microsoft, .Net Passport. http://www.microsoft.com/net/ services/passport/
8 Rigney, C. et al., 'Remote Authentication Dial In User Services(RADIUS),' IETF RFC 2138, 1997
9 Calhoun, P. et al., 'Diameter Base Protocol,' IETF RFC3588, 2003
10 M.S. Bargh, R.J. Hulsebosch, E.H. Eertink, A. Prasad, H. Wang, and P. Schoo, 'Fast Authentication Methods for Handovers between IEEE 802.11 Wireless LANs,' WMASH, 2004   DOI
11 Mohan, S. and Jain, R., 'Two user location strategies for personal communications services,' IEEE Pers. Comm. Vol. 1, No.1, pp. 42-50, 1/4, 1994   DOI   ScienceOn
12 Woo, M., 'Performance analysis of 'Mobile IP Regional Registration,' IEICE Trans. Comm., Vol. E86-B, No.2, Feb. 2003
13 Salkintzis and Apostolis K., 'Interworking Techniques and Architecture for WLAN/3G Integration Toward 4G Mobile Data Networks,' IEEE Wireless Communications, 2004   DOI   ScienceOn
14 M. Long and C.-H. Wu, and J.D. Irwin, 'Localized authentication for inter-network roaming across wireless LANs,' IEE Proceedings-Commun., Vol.151, No.5, October 2004
15 Michael Hecker and Peter Leijdekkers and Valerie Gay, 'A Testbed For Ubiquitous Computing Using Next Generation Mobile Networks,' CollECTeR 2004
16 Fumiko Satoh and Takayuki Itoh, 'Single Sign On Architecture with Dynamic Tokens,' SAINT, 2004   DOI
17 B. Anton and B. Bullock and J. Short, 'Best Current Practices for Wireless Internet Service Provider(WISP) Roaming,' Wi-Fi Alliance - Wireless ISP Roaming(WISPr), Ver. 1.0, February 2003
18 Kohl, J. and Neuman, C., 'The Kerberos Network Authentication Service (V5),' RFC 1510, 1993
19 3GPP, http://www.3gpp.org