Skip to main content
Log in

A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Since the 802.16e standard has been released, there are few authentication pattern schemes and Extensible Authentication Protocol (EAP) selection proposals for manufacturers to choose from in large-scale network systems. This paper focuses on the re-authentication method’s design, improvement, and optimization for the PMP mode of the IEEE 802.16e standard in large-scale network systems to ensure the security of the keys. We first present an optimized scheme, called EAP_AKAY, based on the EAP-AKA authentication method (Arkko and Haverinen in Extensible Authentication Protocol Method for UMTS Authentication and Key Agreement (EAP-AKA), 2004), and then a self-adaptive K selection mechanism is proposed for re-authentication load balancing based on EAP_AKAY in large-scale network systems. This presented mechanism considers the cost of authentication, not only at the server end, but also at the client end. Thus, this scheme would minimize the total cost and resolve the limitation in current schemes. Furthermore, the K value would be re-selected, not only when MS is roaming to another BS region, but also in residing time to adapt to network environment changes. The simulation results and relevant analysis demonstrate that our scheme is effective in terms of the total cost of authentication, master key renewal, and good security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. IEEE Std 802.16/Conformance0l-2003 (2003) IEEE Standard for Conformance to IEEE 802.16-Part 1: Protocol Implementation Conformance Statement (PICS) Proforma for 10–66 GHz Wireless MAN-SC Air Interface, August

  2. Ma Y, Cao X (2003) How to use EAP-TLS authentication in PWLAN environment. In: IEEE int conf neural networks & signal processing, Dec 14–17

    Google Scholar 

  3. IEEE 802.16 Relay Task Group (2008). http://www.ieee802.org/16/relay/

  4. Dai X, Xie X (2010) Analysis and research of security mechanism in IEEE 802.16j. In: 2010 international conference on anticounterfeiting security and identification

    Google Scholar 

  5. Gaithersburg MD (2011) FIPS 186-2 Digital Signature Standard (DSS). http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf

  6. Vollbrecht J, Levkowetz H (2004) RFC 3748—Extensible Authentication Protocol (EAP), 2004-06

  7. Aboba B, Simon D (1999) PPP EAP TLS Authentication Protocol, RFC 2716, October

  8. Yuksel E (2007) Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis, Kongens Lyngby, IMM-THESIS-2007-16

  9. Chiou S-Y, Chen Y-H, Wang J-T, Liu C-C (2007) Exploration of WiMAX security sublayer. CCL Tech J (119)

  10. Lin YB, Chen YK (2003) Reducing authentication signaling traffic in third-generation mobile network. IEEE Trans Wirel Commun 2(3):493–501. doi:10.1109/TWC.2003.811171

    Article  Google Scholar 

  11. AL-Saraireh J, Yousef S (2007) Analytical model for authentication transmission overhead between entities in mobile networks. Comput Commun 30(8):1713–1720. doi:10.1016/j.comcom.2007.02.001

    Article  Google Scholar 

  12. Jun J, Chen HE, Ling-ge J (2006) The optimized authentication signaling flow for 3GPP-WLAN heterogeneous interworking. J Shanghai Jiaotong Univ 40(1):76–81. doi:1006-2467(2006)01-0076-06

    Google Scholar 

  13. Arkko J, Haverinen H (2004) Extensible Authentication Protocol Method for UMTS Authentication and Key Agreement (EAP-AKA), Internet Draft, draft-arkko- pppext-eap-aka-15.txt, December 21, work in progress

  14. Aiello W (2002) Just Fast Keying (JFK), IETF Draft (work in progress), draft-ietf-ipsec- jfk-03.txt, April

  15. Li S, Li F, Zhang R (2005) Improving 3G authentication protocol with key refreshing. Mod Sci Technol Telecommun, 6:45–471

    Google Scholar 

  16. IMU Prof Zhang (2011) Laplace transform. http://courseware.imu.edu.cn

  17. Chelebus E, Ludwin W (1995) Is handoff traffic really Poissonian. In: IEEE ICUPC95, Tokyo, pp 348–353

    Google Scholar 

  18. Jedrzychi C, Leung VCM (1996) Probability distribution of channel holding time in cellular telephony systems. In: IEEE VTC96, pp 247–250

    Google Scholar 

  19. Fang Y (2001) Hyper—erlang distribution model and its application in wireless mobile networks. Wirel Netw 7:211–219

    Article  MATH  Google Scholar 

  20. Zonoozi MM, Dassanayake P (1997) User mobility modeling and characterization of mobility patterns. IEEE J Sel Areas Commun 15(7), 1239–1252

    Article  Google Scholar 

  21. Khan AS, Fisa N, Yusof SKS, Ariffin SHS, Esa M, Maarof NN, Abbas M (2010) An improved authentication key management scheme for multihop relay in IEEE 802.16m networks. In: IEEE Asia–Pacific conference on applied electromagnetics

    Google Scholar 

  22. Lee Y, Lee HK, Lee GY, Kim HJ, Jeong CK (2009) Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j. ACM

  23. Rengaraju P, Lung C-H, Srinivasan A (2010) Design of distributed security architecture for multihop WiMAX networks. In: 2010 Eighth annual international conference on privacy, security and trust

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Naixue Xiong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fanyang, Xiong, N. & Park, J.H. A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems. J Supercomput 61, 166–188 (2012). https://doi.org/10.1007/s11227-011-0655-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-011-0655-8

Keywords