Skip to main content

Secure and Seamless Handoff Scheme for a Wireless LAN System

  • Conference paper
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (OTM 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4277))

  • 826 Accesses

Abstract

IEEE 802.11i standard specifies full authentication and preauthentication for secure handoff in 802.11 wireless LAN (WLAN). However, the full authentication is too slow to provide seamless services for handoff users, and preauthentication may fail in highly populated WLANs where it is highly probable that the cache entry of a preauthenticated user is evicted by other users before handoff. In this paper, we propose a seamless and secure handoff scheme by reducing authentication and key management delay in the handoff process. When a user handoffs, security context established between the user and the previous access point (AP) is forwarded from the previous AP to the current AP, and the session key is reused only for the handoff session. The freshness of session key is maintained by regenerating session keys after handoff session is terminated. The proposed scheme can achieve considerable reduction in handoff delay with providing the same security level as 802.1X authentication by letting an AP authenticate a handoff user before making an robust security network association (RSNA) with it.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. IEEE Std. 802.11i: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifiations: Amendment 6: Medium Access Control(MAC) Security Enhancement (July 2004)

    Google Scholar 

  2. Pack, S., Choi, Y.: Fast Inter-AP Handoff Using Predictive-Authentication Scheme in a Public Wireless LAN. IEEE Networks (August 2002)

    Google Scholar 

  3. Mishra, A., et al.: Proactive Key Distribution Using Neighbor Graphs. IEEE Wireless Communications (February 2004)

    Google Scholar 

  4. Aboba, B., Simon, D.: PPP EAP TLS Authentication Protocol. RFC 2716 (October 1999)

    Google Scholar 

  5. IEEE Std. 802.11f: IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distributed Systems Supporting IEEE 802.11 Operation (July 2003)

    Google Scholar 

  6. Zonoozi, M.M., Dassanayake, P.: User Mobility Modeling and Characterization of Mobility Patterns. IEEE JSAC 15(7) (September 1997)

    Google Scholar 

  7. Xie, H., et al.: Dynamic Location Area Management and Performance Analysis. In: Proc. VTC 1993 (May 1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, J., Kim, B., Hwang, I. (2006). Secure and Seamless Handoff Scheme for a Wireless LAN System. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_83

Download citation

  • DOI: https://doi.org/10.1007/11915034_83

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48269-7

  • Online ISBN: 978-3-540-48272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics