Skip to main content

A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network

  • Conference paper
Information Security Applications (WISA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3786))

Included in the following conference series:

Abstract

This paper proposes a hash-chain based authentication scheme for fast handover in wireless network (HAS). The full authentication procedure described in IEEE 802.11 is inappropriate to be applied to a handover, since it has heavy operation and delay time during handover. Though various methods were proposed to solve the problem, the existing schemes degrade the security of authentication or impose the entire administrative burden of the authentication on the authentication server. The main focus of this paper is on reducing the administrative burden of the authentication server and enhances the security strength of the fast handover authentication. The proposed scheme in this paper is robust to the attack by a compromised AP by using hash key chain between a mobile station and the authentication server. The scheme also decentralizes the administrative burden of the authentication server to other network entities.

This work was supported by the Korea Research Foundation Grant (M07-2004-000-10295-0). This research is supported by the ubiquitous Autonomic Computing and Network Project, the Ministry of Information and Communication (MIC) 21st Century Frontier R&D Program in Korea.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE standard, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE 802.11 (1999)

    Google Scholar 

  2. IEEE standard, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Medium Access Control (MAC) Security Enhancements, IEEE 802.11i (2004)

    Google Scholar 

  3. IEEE standard, Port-Based Network Access Control, IEEE 802.1x (2001)

    Google Scholar 

  4. IEEE standard, IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems, IEEE 802.11f (2003)

    Google Scholar 

  5. Aboba, B., Simon, D.: PPP EAP TLS Authentication Protocol, IETF RFC 2716 (October 1999)

    Google Scholar 

  6. Pack, S., Choi, Y.: Fast handoff scheme based on mobility prediction in public wireless LAN systems. IEE Proceedings Communications 151(5), 489–495 (2004)

    Article  Google Scholar 

  7. Mishra, A., Shin, M.H., Petroni Jr., N.L., Clancy, T.C., Arbauch, W.A.: Proactive key distribution using neighbor graphs. IEEE Wireless Communications 11(1), 26–36 (2004)

    Article  Google Scholar 

  8. Mishra, A., Shin, M.H., Arbauch, W.A.: Context Caching using Neighbour Graphs for Fast Handoffs in a Wireless Network. In: Proc. of IEEE INFOCOM, Hong Kong (March 2004)

    Google Scholar 

  9. Wang, H., Prasad, A.R.: Fast Authentication for Inter-domain Handover. In: de Souza, J.N., Dini, P., Lorenz, P. (eds.) ICT 2004. LNCS, vol. 3124, pp. 973–982. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Bargh, M.S., Hulsebosch, R.J., Eertink, E.H., Prasad, A., Wang, H., Schoo, P.: Fast Authentication Methods for Handovers between IEEE 802.11 Wireless LANs. In: WMASH 2004 (October 1, 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hong, K., Jung, S., Wu, S.F. (2006). A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. In: Song, JS., Kwon, T., Yung, M. (eds) Information Security Applications. WISA 2005. Lecture Notes in Computer Science, vol 3786. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11604938_8

Download citation

  • DOI: https://doi.org/10.1007/11604938_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31012-9

  • Online ISBN: 978-3-540-33153-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics