Abstract
Several statistics achieved to date on the Internet attacks have shown that one of the major causes for their proliferation is the scarce deployment of entity authentication mechanisms. Providing seamless support for real-time applications during the inter-domain handover procedure is one of the issues that still hinder the adoption of the network entity authentication service. In this paper, we focus on the design of a novel handover re-authentication protocol that can allow overcoming the current state. Furthermore, we also define the overall requirements for the underlying class of cryptographic methods which shall be used to implement our protocol. Thereafter, we present the preliminary results that were achieved on the re-authentication protocol validation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wendt, S., Kharrat-Kammoun, F., Borcoci, E., Cacoveanu, R., Lupu, R., Hayes, D.: Network architecture and system specification, SMART-Net project IST-FP7 223937 (October 2009)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (October 1996)
Dolev, D., Yao, A.: On the security of Public-Key Protocols. IEEE Transactions on Information Theory 2(29) (1983)
Calhoun, P., Montemurro, M., Stanley, D.: Control and Provisioning of Wireless Access Points (CAPWAP) Protocol Specification, IETF, RFC 5415 (March 2009)
Komarova, M.: Fast authentication and trust based access control in heterogeneous wireless networks, Ph.D. Thesis (May 2008)
Mishra, A., Shin, M., Arbaugh, W.: An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process
Clancy, T., Nakhjiri, M., Narayanan, V., Dondeti, L.: Handover Key Management and Re-Authentication Problem Statement, IETF, RFC 5169 (March 2008), www.ietf.org
Narayanan, V., Dondeti, L.: EAP Extensions for EAP Re-authentication Protocol (ERP), IETF, RFC 5296 (August 2008), www.ietf.org
Hoeper, K., Ohba, Y.: Distribution of EAP based keys for handover and re-authentication, IETF, draft-ietf-hokey-key-mgm-06 (April 2009), www.ietf.org
Clancy, T.: Secure Handover in Enterprise WLANs: CAPWAP, HOKEY and 802.11r
Huang, P.J., Tseng, Y.C.: A Fast Handoff Mechanism for IEEE 802.11 and IAPP Networks
Chen, J.J., Tseng, Y.C., Lee, H.W.: A Seamless Handoff Mechanism for IEEE 802.11 WLANs Supporting IEEE 802.11i Security Enhancements
Bournelle, J., Laurent-Maknavicius, M., El Mghazli, Y., Giaretta, G., Lopez, R., Ohba, Y.: Use of Context Transfer Protocol (CXTP) for PANA, draft-ietf-pana-cxtp-01 (March 2006), www.ietf.org
Ohba, Y.: Pre-authentication support for PANA, draft-ietf-pana-preauth-06 (June 2009), www.ietf.org
Forsberg, D., Ohba, Y., Tschofenig, B., Yegin, A.: Protocol for carrying authentication for network access (PANA), RFC 5191 (May 2008), www.ietf.org
Lupu, R., Borcoci, E., Mirzadeh, S., Hamadani, E., Rasheed, T.: D3.5a: Security and Privacy Requirements, SMART-Net project IST 223937 (April 2009)
Farell, S., Volbrecht, J., Calhoun, P.: AAA Authorization Requirements, RFC 2906, IETF (August 2000)
Aboba, B., Beadles, M.: The network identifier, RFC 2486, IETF (January 1999)
Vollbrecht, J., Calhoun, P., Farell, S., et al.: AAA Authorization Framework, RFC 2904, IETF (August 2000)
Lupu, R., Stanciu, M.: Authentication and authorization architecture for hybrid mesh networks. In: Conf. Int. Communications 2010 (Iunie 2010)
Long, M., Wu, C-H., David Irwin, J.: Localized Authentication for Wireless LAN Inter-network Roaming
Lin, X., Ling, X., Zhu, H., Ho, P.H., Shen, X.: A novel localised authentication scheme in IEEE 802.11 based wireless mesh network. Intl. Journal Security and Networks 3(2) (2008)
Hong, Z., Rui, H., Man, Y.: A novel fast authentication method for mobile network access (2004)
AVISPA, www.avispa-project.org
IEEE-SA Standards Board, Port-based Network Access Control, IEEE Std. 802.1x-2001 (October 2001) ISBN 0-7381-2626-7
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Lupu, R., Borcoci, E., Galatchi, D., Rasheed, T. (2012). Real-Time Inter-domain Handover Re-authentication Protocol. In: Tomkos, I., Bouras, C.J., Ellinas, G., Demestichas, P., Sinha, P. (eds) Broadband Communications, Networks, and Systems. BROADNETS 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 66. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30376-0_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-30376-0_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30375-3
Online ISBN: 978-3-642-30376-0
eBook Packages: Computer ScienceComputer Science (R0)