Skip to main content

Secure Protocol for Fast Authentication in EAP-Based Wireless Networks

  • Conference paper
Computational Science and Its Applications – ICCSA 2007 (ICCSA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4706))

Included in the following conference series:

Abstract

In this paper we present a solution for providing a fast transition in heterogeneous mobile networks which involve network access control based on the Extensible Authentication Protocol. The goal is to reduce the time spent on providing access and smooth transition, between different technologies which require to perform authentication to allow network access. We propose and describe an architecture and secure protocol, which reduce the number of round trips during authentication phase, and verify its secure properties with a formal tool.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Marin, R., Martinez, G., Gomez, A.: Evaluation of AAA Infrastructure Deployment in Euro6ix IPv6 Network Project. In: Applied Cryptography and Network Security 2004, Technical Track Proceedings, pp. 325-334. Yellow Mountain, China (June 8-11, 2004)

    Google Scholar 

  2. Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP). RFC 3748 (June 2004)

    Google Scholar 

  3. Georgiades, M., Akhtar, N., Politis, C., Tafazolli, R.: AAA Context Transfer for Seamless and Secure Multimedia Services. In: 5th European Wireless Conference (EW’04), Barcelona, Spain (February 2004)

    Google Scholar 

  4. Aura, T., Roe, M.: Reducing Reauthentication Delay in Wireless Networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks SECURECOMM’05, Athens, Greece, pp. 139–148 (September 2005)

    Google Scholar 

  5. Housley, R., Aboba, B.: Guidance for AAA Key Management. draft-housley-aaa-key-mgmt-06, IETF Internet Draft, Work in Progress (November 2006)

    Google Scholar 

  6. Narayanan, V., Dondeti, L.: EAP Extensions for Efficient Re-authentication draft-vidya-eap-er-02, IETF Internet Draft, Work in Progress (January 2007)

    Google Scholar 

  7. Ohba, Y., Das, S., Marin, R.: An EAP Method for EAP Extension (EAP-EXT). draft-ohba-hokey-emu-eap-ext-01, IETF Internet Draft, Work in Progress (March 2007)

    Google Scholar 

  8. Kim, H., Shin, K.G., Dabbous, W.: Improving Cross-domain Authentication over Wireless Local Area Networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks SECURECOMM’05, pp. 127-138, Athens, Greece (September 2005)

    Google Scholar 

  9. I. of Electrical and E. Engineer: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security IEEE 802.11i, IEEE std. (July 2005)

    Google Scholar 

  10. Aboba, B., Calhoun, P.: RADIUS support for EAP. RFC 3579 (June 2003)

    Google Scholar 

  11. Eronen, P., Hiller, T., Zorn, G.: Diameter Extensible Authentication Protocol (EAP) Application. RFC 4072 (August 2005)

    Google Scholar 

  12. Aboba, B., Simon, D., Arkko, J., Eronen, P., Levkowetz, H.: Extensible Authentication Protocol (EAP) Key Management Framework. draft-ietf-eap-keying-15.txt, IETF Internet Draft (October 2006)

    Google Scholar 

  13. Salowey, J., Dondeti, L., Narayanan, V., Nakhjiri, M.: Specification for the Derivation of Usage Specific Root Keys (USRK) from an Extended Master Session Key (EMSK). draft-ietf-hokey-emsk-hierarchy-00.txt, IETF Internet Draft (January 2007)

    Google Scholar 

  14. Kauffman, C.: Internet Key Exchange (IKEv2) Protocol. RFC 4306 (December 2005)

    Google Scholar 

  15. Harskin, D., Ohba, Y., Nakhjiri, M., Marin, R.: Problem Statement and Requirements on a 3-Party Key Distribution Protocol for Handover Keying. draft-ohba-hokey-3party-keydist-ps-01, IETF Internet Draft, Work in Progress (March 2007)

    Google Scholar 

  16. Mishra, A., Shin, M., Petroni, N., Clancy, C., Arbaugh, W.: Proactive Key Distribution Using Neighbor Graphs. IEEE Wireless Communication 11(1), 26–36 (2004)

    Article  Google Scholar 

  17. Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 453. Springer, Heidelberg (2001)

    Google Scholar 

  18. Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110–125. Springer, Heidelberg (1994)

    Google Scholar 

  19. Marin, R., Bournelle, J., Maknavicius-Laurent, M., Combes, J.M., Gomez Skarmeta, A.F.: Improved EAP keying framework for a secure mobility access service. In: International Conference On Communications And Mobile Computing, Vancouver, British Columbia, Canada, pp. 183–188 (March 2006)

    Google Scholar 

  20. National Institute of Standards and Technology: Secure Hash Standard, FIPS 180-2, August 2002. With Change Notice 1 dated (February 2004)

    Google Scholar 

  21. Automated Validation of Internet Security Protocols and Applications (AVISPA): IST Project 2001-39252 http://www.avispa-project.org/

  22. Dutta, A., Zhang, T., Ohba, Y., Taniuchi, K., Schulzrinne, H.: MPA assisted Optimized Proactive Handoff Scheme. ACM Mobiquitous (2005)

    Google Scholar 

  23. Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Marin, R., Zapata, S., Gomez, A.F. (2007). Secure Protocol for Fast Authentication in EAP-Based Wireless Networks. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_93

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74477-1_93

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74475-7

  • Online ISBN: 978-3-540-74477-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics