Abstract
In this paper we present a solution for providing a fast transition in heterogeneous mobile networks which involve network access control based on the Extensible Authentication Protocol. The goal is to reduce the time spent on providing access and smooth transition, between different technologies which require to perform authentication to allow network access. We propose and describe an architecture and secure protocol, which reduce the number of round trips during authentication phase, and verify its secure properties with a formal tool.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Marin, R., Martinez, G., Gomez, A.: Evaluation of AAA Infrastructure Deployment in Euro6ix IPv6 Network Project. In: Applied Cryptography and Network Security 2004, Technical Track Proceedings, pp. 325-334. Yellow Mountain, China (June 8-11, 2004)
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP). RFC 3748 (June 2004)
Georgiades, M., Akhtar, N., Politis, C., Tafazolli, R.: AAA Context Transfer for Seamless and Secure Multimedia Services. In: 5th European Wireless Conference (EW’04), Barcelona, Spain (February 2004)
Aura, T., Roe, M.: Reducing Reauthentication Delay in Wireless Networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks SECURECOMM’05, Athens, Greece, pp. 139–148 (September 2005)
Housley, R., Aboba, B.: Guidance for AAA Key Management. draft-housley-aaa-key-mgmt-06, IETF Internet Draft, Work in Progress (November 2006)
Narayanan, V., Dondeti, L.: EAP Extensions for Efficient Re-authentication draft-vidya-eap-er-02, IETF Internet Draft, Work in Progress (January 2007)
Ohba, Y., Das, S., Marin, R.: An EAP Method for EAP Extension (EAP-EXT). draft-ohba-hokey-emu-eap-ext-01, IETF Internet Draft, Work in Progress (March 2007)
Kim, H., Shin, K.G., Dabbous, W.: Improving Cross-domain Authentication over Wireless Local Area Networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks SECURECOMM’05, pp. 127-138, Athens, Greece (September 2005)
I. of Electrical and E. Engineer: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security IEEE 802.11i, IEEE std. (July 2005)
Aboba, B., Calhoun, P.: RADIUS support for EAP. RFC 3579 (June 2003)
Eronen, P., Hiller, T., Zorn, G.: Diameter Extensible Authentication Protocol (EAP) Application. RFC 4072 (August 2005)
Aboba, B., Simon, D., Arkko, J., Eronen, P., Levkowetz, H.: Extensible Authentication Protocol (EAP) Key Management Framework. draft-ietf-eap-keying-15.txt, IETF Internet Draft (October 2006)
Salowey, J., Dondeti, L., Narayanan, V., Nakhjiri, M.: Specification for the Derivation of Usage Specific Root Keys (USRK) from an Extended Master Session Key (EMSK). draft-ietf-hokey-emsk-hierarchy-00.txt, IETF Internet Draft (January 2007)
Kauffman, C.: Internet Key Exchange (IKEv2) Protocol. RFC 4306 (December 2005)
Harskin, D., Ohba, Y., Nakhjiri, M., Marin, R.: Problem Statement and Requirements on a 3-Party Key Distribution Protocol for Handover Keying. draft-ohba-hokey-3party-keydist-ps-01, IETF Internet Draft, Work in Progress (March 2007)
Mishra, A., Shin, M., Petroni, N., Clancy, C., Arbaugh, W.: Proactive Key Distribution Using Neighbor Graphs. IEEE Wireless Communication 11(1), 26–36 (2004)
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 453. Springer, Heidelberg (2001)
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110–125. Springer, Heidelberg (1994)
Marin, R., Bournelle, J., Maknavicius-Laurent, M., Combes, J.M., Gomez Skarmeta, A.F.: Improved EAP keying framework for a secure mobility access service. In: International Conference On Communications And Mobile Computing, Vancouver, British Columbia, Canada, pp. 183–188 (March 2006)
National Institute of Standards and Technology: Secure Hash Standard, FIPS 180-2, August 2002. With Change Notice 1 dated (February 2004)
Automated Validation of Internet Security Protocols and Applications (AVISPA): IST Project 2001-39252 http://www.avispa-project.org/
Dutta, A., Zhang, T., Ohba, Y., Taniuchi, K., Schulzrinne, H.: MPA assisted Optimized Proactive Handoff Scheme. ACM Mobiquitous (2005)
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Marin, R., Zapata, S., Gomez, A.F. (2007). Secure Protocol for Fast Authentication in EAP-Based Wireless Networks. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_93
Download citation
DOI: https://doi.org/10.1007/978-3-540-74477-1_93
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74475-7
Online ISBN: 978-3-540-74477-1
eBook Packages: Computer ScienceComputer Science (R0)