Abstract
The authentication mechanisms in Broadband Wireless Networks (BWN) are predominantly based on Extensible Authentication Protocol (EAP). However, the complexity of EAP causes an impediment in BWN networks which involve high speed mobility. Even though it provides a highly secured mechanism, the current authentication process has high authentication overheads which affect the Quality of Service (QoS) in time sensitive data applications such as VoIP and VoD. The alternative would be to consider re-authentication approach which reduces the number of full EAP authentications but at the same time provides a secure handoff to the mobile users at a lower latency and hence does not impact the QoS of the applications. The proposed Frequency-based Re-authentication Protocol (FRP) is an extension to EAP, aiming to reduce the network access time and in turn reduce the authentication latency, by taking into account the frequency of visits of a particular mobile user to an access domain. In addition, we also propose a frequent – User Authentication Process (f-UAP) which when used with FRP significantly minimizes the EAP authentication overhead. A mathematical model is formulated to illustrate the tradeoff achieved when FRP along with EAP is used in the f-UAP approach. The security evaluation of the proposed FRP is carried out using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Furthermore, simulation analysis show that the FRP authentication latency is lower compared to the existing re-authentication mechanisms.
Similar content being viewed by others
References
Miguel PL, Shiwen M, Frank S, Jen S, Thomas M, Raheem A, Scott M (2010) Advances in wireless test beds and research infrastructures, mobile network applications (MONET), springer, 15:311–314
David QL, Mark C (2008) Extensible authentication protocols for IEEE standards 802.11 and 802.16. In: Proc. ACM The International Conference on Mobile Technology, Applications & Systems, ACM, Article No.47
Xu Q, Wan C, Hu A (2008) The performance analysis of fast EAP re-authentication protocol. Proc IEEE Int Conf Comput Sci Comput Technol 1:99–103
Nguyen TN, Ma M (2012) Enhanced EAP-based Pre-authentication for fast and secure inter-ASN handovers in mobile WiMAX networks. IEEE Trans Wirel Commun 11(6):2173–2181
Junbeom H, Hyeongseop S, Pyung K, Hyunsoo Y, Nah-Oak S (2008) Security considerations for handover schemes in mobile WiMAX networks. In: Proc. IEEE Wireless Communications and Networking Conference, IEEE, pp 2531–2536
Ahmed M. T, Abdel-Hamid AT, Sofiene T (2009) Formal analysis of the handover schemes in mobile WiMAX Networks. Proc. IEEE IFIP International Conference on Wireless and Optical Communications Networks, IEEE, pp 1–5
Daojing H, Chun C, Jiajun B (2013) Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects. Commun Mag IEEE 51(2):142–150
Ahmed MT, Abdel-Hamid AT, Sofiene T (2009) Formal analysis of the handover schemes in mobile WiMAX networks. In: Proc. IEEE International Conference on Wireless and Optical Communications Networks, IEEE, pp 1–5
Sreejesh S, Sebastian MP (2010) A revised secure authentication protocol for IEEE 802.16 (e). In: Proc. IEEE International conference on advances in computer engineering (ACE), IEEE, pp 34–38
Brandon M, ChengCheng L (2013) A survey of the security and threats of the IMT-advanced requirements for 4G standards. In: Proc. Conference Anthology, IEEE, pp:1–5
Constantinos K, Georgios K, Stefanos G (2013) Attacks and countermeasures on 802.16: analysis and assessment, communications surveys & tutorials, IEEE, 15(1): 487–514
Vinod KJ, Vrijendra S (2014) Mobile WiMAX network security threats and solutions: a survey, In. Proc. IEEE international conference on computer and communication technology, IEEE, PP: 135–140
Network Working Group (2006) RFC:4187, Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA). January
Xinghua L, Xiang L, Jianfeng M, Zhenfang Z, Li X, YoungHo P (2011) Authentications and key management in 3G-WLAN interworking, mobile networks and applications (MONET), Springer, 16(3):394–407
Marin-Lopez R, Pereniguez F, Bernal F, Gomez AF (2010) Secure three-party key distribution protocol for fast network access in EAP-based wireless networks. J Comput Networks 54(15):2651–2673, Elsevier Publications
Shidhani AAL, Leung VCM (2011) Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN Handovers”, IEEE transactions on dependable and secure computing, 8(5):699–713
Chrabaszcz R, Pacyna P (2012) Fast re-authentication of mobile devices with EAP Re-authentication protocol (ERP). In: Proc. IEEE XVth international conference on telecommunications network strategy and planning, IEEE, pp 1–6
Network Working Group (2011) Internet-draft, architecture for fast EAP re-authentication based on a new EAP method (EAP-FRM) working on standalone mode. September
Lin S-H, Chiu J-H, Lee G-R (2010) A fast iterative localized Re-authentication protocol for heterogeneous mobile networks. IEEE Trans Consum Electron 56(4):2267–2275
Shidhani AA, Leung VCM (2007) Local fast re-authentication protocol for 3G-WLAN interworking architecture. In: Proc. IEEE conference on wireless telecommunications symposium, IEEE, pp 1–8
Madjid N (2007) Use of EAP-AKA, IETF HOKEY and AAA mechanisms to provide access and handover security and 3G-802.16 m interworking. In: Proc. IEEE 18th international symposium on personal, indoor and mobile radio communications, IEEE, pp 1–5
Chengzhe L, Hui L, Yueyu Z, Jin C (2013) Simple and Low-cost Re-authentication protocol for HeNB. IEEE China Commun 10(1):105–115
Ye Y, Jiannong C, Chuda L, Seong WK, Weigang W (2009) A dual re-authentication scheme for fast handoff in IEEE 802.11 wireless mesh networks. In: Proc. IEEE wireless communications and networking conference, IEEE, pp 1–5
Hsu S-F, Lin Y-B (2009) A Key caching mechanism for reducing WiMAX authentication cost in handoff. IEEE Trans Veh Technol 58(8):4507–4513
Anantha NV, Suresh K, Rajeswari A (2014) Enhanced fast iterative localized re-authentication protocol for UMTS-WLAN interworking. In: Proc. IEEE international conference on electronics and communication systems, IEEE, pp: 1–5
Song M, Wang L, Huang J, Song J (2009) An optimal interworking authentication scheme based on EAP-AKA for heterogeneous access networks. In: Proc. IEEE canadian conference on electrical and computer engineering, IEEE, pp 794–797
Kim Y, Bahk S (2008) Enhancing security using the discarded security information in mobile WiMAX networks. In: Proc. IEEE Global Telecommunications Conference, IEEE, pp 1–5
Rafal C, Piotr P (2012) Fast re-authentication of mobile devices with EAP Re-authentication Protocol (ERP). In: Proc. IEEE XVth international conference on telecommunications network strategy and planning symposium (NETWORKS), IEEE, pp 1–6
Anmin F, Yuqing Z, Zhenchao Z, Xuefeng L (2010) A fast handover authentication mechanism based on ticket for IEEE 802.16 m. Commun Lett IEEE 14(12):1134–1136
Rengaraju P, Lung C-H, Srinivasan A (2014) QoS-aware distributed security architecture for 4G multihop wireless networks. IEEE Trans Veh Technol 63(6):2886–2900
Aura T, Roe M (2005) Reducing reauthentication delay in wireless networks. In: Proc. IEEE first international conference on security and privacy for emerging areas in communications networks, IEEE, pp 139–148
Antonio I, Nada G, Katrin H, Lidong C (2008) Using the EAP framework for fast media independent handover authentication. In: Proc. ACM WICON ’08 proceedings of the 4th annual international conference on wireless internet, ACM, Article No. 42
Wu L-Y, Lin Y-B (2007) Authentication vector management for UMTS”. IEEE Trans Wirel Commun 6(11):4101–4107
Lin Y-B, Chen Y-K (2003) Reducing authentication signaling traffic in third generation mobile network. IEEE Trans Wirel Commun 2(3):493–501
El Hajjaji El Idrissi Y, Zahid N, Mohamed JM. (2013) A new fast re-authentication method for the 3G-WLAN interworking based on EAP-AKA. In: Proc. IEEE 20th international conference on telecommunications, IEEE, pp 1–5
Ahmad S, Mir AH, Beigh GR (2011) Latency evaluation of extensible authentication protocols in WLANs. In: Proc. IEEE 5th international conference on advanced networks and telecommunication systems, IEEE, pp 1–5
Younes EHEI, Noureddine Z, Mohamed J (2012) Security analysis of 3GPP (LTE) - WLAN interworking and a new local authentication method based on EAP-AKA. In: Proc. IEEE international conference on future generation communication technology, IEEE, PP: 137–142
Munoz A, Mana A, Serrano D (2009) AVISPA in the validation of ambient intelligence scenarios. In: Proc. IEEE international conference on availability, reliability and security, IEEE, pp 420–426
AVISPA – A tool for Automated Validation of Internet Security Protocols. http://www.avispa-project.org.
Rai AK, Kumar V, Mishra S (2011) An efficient password authenticated key exchange protocol for WLAN and WIMAX. In: Proc. ACM international conference and workshop on emerging trends in technology (ICWET’11)
Cao J, Ma M-D, Li H (2013) Handover authentication between different types of eNBs in LTE networks. The Journal of China Universities of Posts and Telecommunications, Elsevier, pp 106–112
Acknowledgments
Gunasekaran Raja gratefully acknowledges support from UGC Raman Post-Doctoral Fellowship F.No.5-72/2014(IC)
Sheeba Backia Mary Baskaran gratefully acknowledges support from UGC-Maulana Azad National Fellowship (No. MANF-2013-14-CHR-TAM-28452).
Gunasekaran Raja and Sheeba Backia Mary Baskaran gratefully acknowledges the support from NGN Labs, Department of Computer Technology, Anna University, Chennai, India.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Raja, G., Mary Baskaran, S., Ghosal, D. et al. Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks. Mobile Netw Appl 21, 523–538 (2016). https://doi.org/10.1007/s11036-015-0642-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-015-0642-z