Abstract
IEEE 802.11i standard specifies full authentication and preauthentication for secure handoff in 802.11 wireless LAN (WLAN). However, the full authentication is too slow to provide seamless services for handoff users, and preauthentication may fail in highly populated WLANs where it is highly probable that the cache entry of a preauthenticated user is evicted by other users before handoff. In this paper, we propose a seamless and secure handoff scheme by reducing authentication and key management delay in the handoff process. When a user handoffs, security context established between the user and the previous access point (AP) is forwarded from the previous AP to the current AP, and the session key is reused only for the handoff session. The freshness of session key is maintained by regenerating session keys after handoff session is terminated. The proposed scheme can achieve considerable reduction in handoff delay with providing the same security level as 802.1X authentication by letting an AP authenticate a handoff user before making an robust security network association (RSNA) with it.
An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
IEEE Std. 802.11i: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifiations: Amendment 6: Medium Access Control(MAC) Security Enhancement (July 2004)
Pack, S., Choi, Y.: Fast Inter-AP Handoff Using Predictive-Authentication Scheme in a Public Wireless LAN. IEEE Networks (August 2002)
Mishra, A., et al.: Proactive Key Distribution Using Neighbor Graphs. IEEE Wireless Communications (February 2004)
Aboba, B., Simon, D.: PPP EAP TLS Authentication Protocol. RFC 2716 (October 1999)
IEEE Std. 802.11f: IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distributed Systems Supporting IEEE 802.11 Operation (July 2003)
Zonoozi, M.M., Dassanayake, P.: User Mobility Modeling and Characterization of Mobility Patterns. IEEE JSAC 15(7) (September 1997)
Xie, H., et al.: Dynamic Location Area Management and Performance Analysis. In: Proc. VTC 1993 (May 1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, J., Kim, B., Hwang, I. (2006). Secure and Seamless Handoff Scheme for a Wireless LAN System. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_83
Download citation
DOI: https://doi.org/10.1007/11915034_83
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48269-7
Online ISBN: 978-3-540-48272-7
eBook Packages: Computer ScienceComputer Science (R0)