Skip to main content
Log in

Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The authentication mechanisms in Broadband Wireless Networks (BWN) are predominantly based on Extensible Authentication Protocol (EAP). However, the complexity of EAP causes an impediment in BWN networks which involve high speed mobility. Even though it provides a highly secured mechanism, the current authentication process has high authentication overheads which affect the Quality of Service (QoS) in time sensitive data applications such as VoIP and VoD. The alternative would be to consider re-authentication approach which reduces the number of full EAP authentications but at the same time provides a secure handoff to the mobile users at a lower latency and hence does not impact the QoS of the applications. The proposed Frequency-based Re-authentication Protocol (FRP) is an extension to EAP, aiming to reduce the network access time and in turn reduce the authentication latency, by taking into account the frequency of visits of a particular mobile user to an access domain. In addition, we also propose a frequent – User Authentication Process (f-UAP) which when used with FRP significantly minimizes the EAP authentication overhead. A mathematical model is formulated to illustrate the tradeoff achieved when FRP along with EAP is used in the f-UAP approach. The security evaluation of the proposed FRP is carried out using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Furthermore, simulation analysis show that the FRP authentication latency is lower compared to the existing re-authentication mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Miguel PL, Shiwen M, Frank S, Jen S, Thomas M, Raheem A, Scott M (2010) Advances in wireless test beds and research infrastructures, mobile network applications (MONET), springer, 15:311–314

  2. David QL, Mark C (2008) Extensible authentication protocols for IEEE standards 802.11 and 802.16. In: Proc. ACM The International Conference on Mobile Technology, Applications & Systems, ACM, Article No.47

  3. Xu Q, Wan C, Hu A (2008) The performance analysis of fast EAP re-authentication protocol. Proc IEEE Int Conf Comput Sci Comput Technol 1:99–103

    Google Scholar 

  4. Nguyen TN, Ma M (2012) Enhanced EAP-based Pre-authentication for fast and secure inter-ASN handovers in mobile WiMAX networks. IEEE Trans Wirel Commun 11(6):2173–2181

    Article  Google Scholar 

  5. Junbeom H, Hyeongseop S, Pyung K, Hyunsoo Y, Nah-Oak S (2008) Security considerations for handover schemes in mobile WiMAX networks. In: Proc. IEEE Wireless Communications and Networking Conference, IEEE, pp 2531–2536

  6. Ahmed M. T, Abdel-Hamid AT, Sofiene T (2009) Formal analysis of the handover schemes in mobile WiMAX Networks. Proc. IEEE IFIP International Conference on Wireless and Optical Communications Networks, IEEE, pp 1–5

  7. Daojing H, Chun C, Jiajun B (2013) Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects. Commun Mag IEEE 51(2):142–150

    Article  Google Scholar 

  8. Ahmed MT, Abdel-Hamid AT, Sofiene T (2009) Formal analysis of the handover schemes in mobile WiMAX networks. In: Proc. IEEE International Conference on Wireless and Optical Communications Networks, IEEE, pp 1–5

  9. Sreejesh S, Sebastian MP (2010) A revised secure authentication protocol for IEEE 802.16 (e). In: Proc. IEEE International conference on advances in computer engineering (ACE), IEEE, pp 34–38

  10. Brandon M, ChengCheng L (2013) A survey of the security and threats of the IMT-advanced requirements for 4G standards. In: Proc. Conference Anthology, IEEE, pp:1–5

  11. Constantinos K, Georgios K, Stefanos G (2013) Attacks and countermeasures on 802.16: analysis and assessment, communications surveys & tutorials, IEEE, 15(1): 487–514

  12. Vinod KJ, Vrijendra S (2014) Mobile WiMAX network security threats and solutions: a survey, In. Proc. IEEE international conference on computer and communication technology, IEEE, PP: 135–140

  13. Network Working Group (2006) RFC:4187, Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA). January

  14. Xinghua L, Xiang L, Jianfeng M, Zhenfang Z, Li X, YoungHo P (2011) Authentications and key management in 3G-WLAN interworking, mobile networks and applications (MONET), Springer, 16(3):394–407

  15. Marin-Lopez R, Pereniguez F, Bernal F, Gomez AF (2010) Secure three-party key distribution protocol for fast network access in EAP-based wireless networks. J Comput Networks 54(15):2651–2673, Elsevier Publications

    Article  MATH  Google Scholar 

  16. Shidhani AAL, Leung VCM (2011) Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN Handovers”, IEEE transactions on dependable and secure computing, 8(5):699–713

  17. Chrabaszcz R, Pacyna P (2012) Fast re-authentication of mobile devices with EAP Re-authentication protocol (ERP). In: Proc. IEEE XVth international conference on telecommunications network strategy and planning, IEEE, pp 1–6

  18. Network Working Group (2011) Internet-draft, architecture for fast EAP re-authentication based on a new EAP method (EAP-FRM) working on standalone mode. September

  19. Lin S-H, Chiu J-H, Lee G-R (2010) A fast iterative localized Re-authentication protocol for heterogeneous mobile networks. IEEE Trans Consum Electron 56(4):2267–2275

    Article  Google Scholar 

  20. Shidhani AA, Leung VCM (2007) Local fast re-authentication protocol for 3G-WLAN interworking architecture. In: Proc. IEEE conference on wireless telecommunications symposium, IEEE, pp 1–8

  21. Madjid N (2007) Use of EAP-AKA, IETF HOKEY and AAA mechanisms to provide access and handover security and 3G-802.16 m interworking. In: Proc. IEEE 18th international symposium on personal, indoor and mobile radio communications, IEEE, pp 1–5

  22. Chengzhe L, Hui L, Yueyu Z, Jin C (2013) Simple and Low-cost Re-authentication protocol for HeNB. IEEE China Commun 10(1):105–115

    Article  Google Scholar 

  23. Ye Y, Jiannong C, Chuda L, Seong WK, Weigang W (2009) A dual re-authentication scheme for fast handoff in IEEE 802.11 wireless mesh networks. In: Proc. IEEE wireless communications and networking conference, IEEE, pp 1–5

  24. Hsu S-F, Lin Y-B (2009) A Key caching mechanism for reducing WiMAX authentication cost in handoff. IEEE Trans Veh Technol 58(8):4507–4513

    Article  Google Scholar 

  25. Anantha NV, Suresh K, Rajeswari A (2014) Enhanced fast iterative localized re-authentication protocol for UMTS-WLAN interworking. In: Proc. IEEE international conference on electronics and communication systems, IEEE, pp: 1–5

  26. Song M, Wang L, Huang J, Song J (2009) An optimal interworking authentication scheme based on EAP-AKA for heterogeneous access networks. In: Proc. IEEE canadian conference on electrical and computer engineering, IEEE, pp 794–797

  27. Kim Y, Bahk S (2008) Enhancing security using the discarded security information in mobile WiMAX networks. In: Proc. IEEE Global Telecommunications Conference, IEEE, pp 1–5

  28. http://datatracker.ietf.org/doc/rfc5295

  29. Rafal C, Piotr P (2012) Fast re-authentication of mobile devices with EAP Re-authentication Protocol (ERP). In: Proc. IEEE XVth international conference on telecommunications network strategy and planning symposium (NETWORKS), IEEE, pp 1–6

  30. Anmin F, Yuqing Z, Zhenchao Z, Xuefeng L (2010) A fast handover authentication mechanism based on ticket for IEEE 802.16 m. Commun Lett IEEE 14(12):1134–1136

    Article  Google Scholar 

  31. Rengaraju P, Lung C-H, Srinivasan A (2014) QoS-aware distributed security architecture for 4G multihop wireless networks. IEEE Trans Veh Technol 63(6):2886–2900

    Article  Google Scholar 

  32. Aura T, Roe M (2005) Reducing reauthentication delay in wireless networks. In: Proc. IEEE first international conference on security and privacy for emerging areas in communications networks, IEEE, pp 139–148

  33. Antonio I, Nada G, Katrin H, Lidong C (2008) Using the EAP framework for fast media independent handover authentication. In: Proc. ACM WICON ’08 proceedings of the 4th annual international conference on wireless internet, ACM, Article No. 42

  34. Wu L-Y, Lin Y-B (2007) Authentication vector management for UMTS”. IEEE Trans Wirel Commun 6(11):4101–4107

    Article  Google Scholar 

  35. Lin Y-B, Chen Y-K (2003) Reducing authentication signaling traffic in third generation mobile network. IEEE Trans Wirel Commun 2(3):493–501

    Article  Google Scholar 

  36. El Hajjaji El Idrissi Y, Zahid N, Mohamed JM. (2013) A new fast re-authentication method for the 3G-WLAN interworking based on EAP-AKA. In: Proc. IEEE 20th international conference on telecommunications, IEEE, pp 1–5

  37. Ahmad S, Mir AH, Beigh GR (2011) Latency evaluation of extensible authentication protocols in WLANs. In: Proc. IEEE 5th international conference on advanced networks and telecommunication systems, IEEE, pp 1–5

  38. Younes EHEI, Noureddine Z, Mohamed J (2012) Security analysis of 3GPP (LTE) - WLAN interworking and a new local authentication method based on EAP-AKA. In: Proc. IEEE international conference on future generation communication technology, IEEE, PP: 137–142

  39. Munoz A, Mana A, Serrano D (2009) AVISPA in the validation of ambient intelligence scenarios. In: Proc. IEEE international conference on availability, reliability and security, IEEE, pp 420–426

  40. AVISPA – A tool for Automated Validation of Internet Security Protocols. http://www.avispa-project.org.

  41. Rai AK, Kumar V, Mishra S (2011) An efficient password authenticated key exchange protocol for WLAN and WIMAX. In: Proc. ACM international conference and workshop on emerging trends in technology (ICWET’11)

  42. Cao J, Ma M-D, Li H (2013) Handover authentication between different types of eNBs in LTE networks. The Journal of China Universities of Posts and Telecommunications, Elsevier, pp 106–112

Download references

Acknowledgments

Gunasekaran Raja gratefully acknowledges support from UGC Raman Post-Doctoral Fellowship F.No.5-72/2014(IC)

Sheeba Backia Mary Baskaran gratefully acknowledges support from UGC-Maulana Azad National Fellowship (No. MANF-2013-14-CHR-TAM-28452).

Gunasekaran Raja and Sheeba Backia Mary Baskaran gratefully acknowledges the support from NGN Labs, Department of Computer Technology, Anna University, Chennai, India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gunasekaran Raja.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Raja, G., Mary Baskaran, S., Ghosal, D. et al. Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks. Mobile Netw Appl 21, 523–538 (2016). https://doi.org/10.1007/s11036-015-0642-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-015-0642-z

Keywords

Navigation