Skip to main content

A Secure Handover Protocol Design in Wireless Networks with Formal Verification

  • Conference paper
Wired/Wireless Internet Communications (WWIC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4517))

Included in the following conference series:

Abstract

This paper analyses security mechanisms in wireless networks, and designs for secure and efficient protocol for a handover reusing the key materials generated before the handover phase. In order to be sure that our handover protocol does not have any security flaws, we formally validated it using automatic protocol analyzer AVIPSA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE: Part11: Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) specifications. IEEE Std 802.11i (2004)

    Google Scholar 

  2. IEEE: Part16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems. IEEE Std.802.16e (2006)

    Google Scholar 

  3. IEEE: Port-Based Network Access Control. IEEE Std 802.1x (2004)

    Google Scholar 

  4. RFC 3748, Extensible authentication protocol, EAP (June 2004)

    Google Scholar 

  5. 3GPP: 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security, Wireless Local Area Network(WLAN) interworking security. 3GPP TS 33.234 (June 2005)

    Google Scholar 

  6. Prasad, A.R., Wang, H.: A protocol for secure seamless handover. In: Proc. of International Conference on Telecommunications (ICT’04), Fortaleza, Brazil, August 1-7 (2004)

    Google Scholar 

  7. Avispa – a tool for Automated Validation of Internet Security Protocols, http://www.avispa-project.org

  8. Wang, H., Prasad, A.R.: Fast authentication for inter-domain handover. In: de Souza, J.N., Dini, P., Lorenz, P. (eds.) ICT 2004. LNCS, vol. 3124, pp. 973–982. Springer, Heidelberg (2004)

    Google Scholar 

  9. Wang, H., Prasad, A.R., Schoo, P.: Research issues for fast authentication in inter-domain handover. In: Proc. of Wireless World Research Forum (WWRF), Beijing, China (February 2004)

    Google Scholar 

  10. Wang, H., Prasad, A.R.: Security context transfer in vertical handover. In: Proc. of PIMRC 2003, Beijing, China, September 7-10 (2003)

    Google Scholar 

  11. Bayarou, K.M., Eckert, C., Rohr, S., Prasad, A.R., Schoo, P., Wang, H.: 3G and WLAN interworking: Towards a secure solution for tight coupling. In: Proc. of WPMC 2004, Padova, Italy, September 12-15 (2004)

    Google Scholar 

  12. Georgiades, M., Wang, H., Tafazolli, R.: Security of context transfer in future wireless communications. In: Proc. of Wireless World Research Forum (WWRF), Toronto, Canada, November 4-5 (2004)

    Google Scholar 

  13. Span – a Security Protocol Animator for AVISPA, http://www.irisa.fr/lande/genet/span

  14. Lim, S.-H., Yi, O.: A study on EAP-AKA authentication architecture for WiBro wireless network. KICS2005-11-457 (2005)

    Google Scholar 

  15. Lim, S.-H., Yi, O., Jung, C.-H., Bang, K.-S.: A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro. In: Publication at IEEE COMmunication System softWAre and MiddlewaRE 2007 (COMSWARE2007), Bangalore, India, Jan. 7-12 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Fernando Boavida Edmundo Monteiro Saverio Mascolo Yevgeni Koucheryavy

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Lim, SH., Bang, KS., Yi, O., Lim, J. (2007). A Secure Handover Protocol Design in Wireless Networks with Formal Verification. In: Boavida, F., Monteiro, E., Mascolo, S., Koucheryavy, Y. (eds) Wired/Wireless Internet Communications. WWIC 2007. Lecture Notes in Computer Science, vol 4517. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72697-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72697-5_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72694-4

  • Online ISBN: 978-3-540-72697-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics