Abstract
This paper analyses security mechanisms in wireless networks, and designs for secure and efficient protocol for a handover reusing the key materials generated before the handover phase. In order to be sure that our handover protocol does not have any security flaws, we formally validated it using automatic protocol analyzer AVIPSA.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IEEE: Part11: Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) specifications. IEEE Std 802.11i (2004)
IEEE: Part16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems. IEEE Std.802.16e (2006)
IEEE: Port-Based Network Access Control. IEEE Std 802.1x (2004)
RFC 3748, Extensible authentication protocol, EAP (June 2004)
3GPP: 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security, Wireless Local Area Network(WLAN) interworking security. 3GPP TS 33.234 (June 2005)
Prasad, A.R., Wang, H.: A protocol for secure seamless handover. In: Proc. of International Conference on Telecommunications (ICT’04), Fortaleza, Brazil, August 1-7 (2004)
Avispa – a tool for Automated Validation of Internet Security Protocols, http://www.avispa-project.org
Wang, H., Prasad, A.R.: Fast authentication for inter-domain handover. In: de Souza, J.N., Dini, P., Lorenz, P. (eds.) ICT 2004. LNCS, vol. 3124, pp. 973–982. Springer, Heidelberg (2004)
Wang, H., Prasad, A.R., Schoo, P.: Research issues for fast authentication in inter-domain handover. In: Proc. of Wireless World Research Forum (WWRF), Beijing, China (February 2004)
Wang, H., Prasad, A.R.: Security context transfer in vertical handover. In: Proc. of PIMRC 2003, Beijing, China, September 7-10 (2003)
Bayarou, K.M., Eckert, C., Rohr, S., Prasad, A.R., Schoo, P., Wang, H.: 3G and WLAN interworking: Towards a secure solution for tight coupling. In: Proc. of WPMC 2004, Padova, Italy, September 12-15 (2004)
Georgiades, M., Wang, H., Tafazolli, R.: Security of context transfer in future wireless communications. In: Proc. of Wireless World Research Forum (WWRF), Toronto, Canada, November 4-5 (2004)
Span – a Security Protocol Animator for AVISPA, http://www.irisa.fr/lande/genet/span
Lim, S.-H., Yi, O.: A study on EAP-AKA authentication architecture for WiBro wireless network. KICS2005-11-457 (2005)
Lim, S.-H., Yi, O., Jung, C.-H., Bang, K.-S.: A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro. In: Publication at IEEE COMmunication System softWAre and MiddlewaRE 2007 (COMSWARE2007), Bangalore, India, Jan. 7-12 (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Lim, SH., Bang, KS., Yi, O., Lim, J. (2007). A Secure Handover Protocol Design in Wireless Networks with Formal Verification. In: Boavida, F., Monteiro, E., Mascolo, S., Koucheryavy, Y. (eds) Wired/Wireless Internet Communications. WWIC 2007. Lecture Notes in Computer Science, vol 4517. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72697-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-72697-5_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72694-4
Online ISBN: 978-3-540-72697-5
eBook Packages: Computer ScienceComputer Science (R0)