Abstract
Since the 802.16e standard has been released, there are few authentication pattern schemes and Extensible Authentication Protocol (EAP) selection proposals for manufacturers to choose from in large-scale network systems. This paper focuses on the re-authentication method’s design, improvement, and optimization for the PMP mode of the IEEE 802.16e standard in large-scale network systems to ensure the security of the keys. We first present an optimized scheme, called EAP_AKAY, based on the EAP-AKA authentication method (Arkko and Haverinen in Extensible Authentication Protocol Method for UMTS Authentication and Key Agreement (EAP-AKA), 2004), and then a self-adaptive K selection mechanism is proposed for re-authentication load balancing based on EAP_AKAY in large-scale network systems. This presented mechanism considers the cost of authentication, not only at the server end, but also at the client end. Thus, this scheme would minimize the total cost and resolve the limitation in current schemes. Furthermore, the K value would be re-selected, not only when MS is roaming to another BS region, but also in residing time to adapt to network environment changes. The simulation results and relevant analysis demonstrate that our scheme is effective in terms of the total cost of authentication, master key renewal, and good security.
Similar content being viewed by others
References
IEEE Std 802.16/Conformance0l-2003 (2003) IEEE Standard for Conformance to IEEE 802.16-Part 1: Protocol Implementation Conformance Statement (PICS) Proforma for 10–66 GHz Wireless MAN-SC Air Interface, August
Ma Y, Cao X (2003) How to use EAP-TLS authentication in PWLAN environment. In: IEEE int conf neural networks & signal processing, Dec 14–17
IEEE 802.16 Relay Task Group (2008). http://www.ieee802.org/16/relay/
Dai X, Xie X (2010) Analysis and research of security mechanism in IEEE 802.16j. In: 2010 international conference on anticounterfeiting security and identification
Gaithersburg MD (2011) FIPS 186-2 Digital Signature Standard (DSS). http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf
Vollbrecht J, Levkowetz H (2004) RFC 3748—Extensible Authentication Protocol (EAP), 2004-06
Aboba B, Simon D (1999) PPP EAP TLS Authentication Protocol, RFC 2716, October
Yuksel E (2007) Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis, Kongens Lyngby, IMM-THESIS-2007-16
Chiou S-Y, Chen Y-H, Wang J-T, Liu C-C (2007) Exploration of WiMAX security sublayer. CCL Tech J (119)
Lin YB, Chen YK (2003) Reducing authentication signaling traffic in third-generation mobile network. IEEE Trans Wirel Commun 2(3):493–501. doi:10.1109/TWC.2003.811171
AL-Saraireh J, Yousef S (2007) Analytical model for authentication transmission overhead between entities in mobile networks. Comput Commun 30(8):1713–1720. doi:10.1016/j.comcom.2007.02.001
Jun J, Chen HE, Ling-ge J (2006) The optimized authentication signaling flow for 3GPP-WLAN heterogeneous interworking. J Shanghai Jiaotong Univ 40(1):76–81. doi:1006-2467(2006)01-0076-06
Arkko J, Haverinen H (2004) Extensible Authentication Protocol Method for UMTS Authentication and Key Agreement (EAP-AKA), Internet Draft, draft-arkko- pppext-eap-aka-15.txt, December 21, work in progress
Aiello W (2002) Just Fast Keying (JFK), IETF Draft (work in progress), draft-ietf-ipsec- jfk-03.txt, April
Li S, Li F, Zhang R (2005) Improving 3G authentication protocol with key refreshing. Mod Sci Technol Telecommun, 6:45–471
IMU Prof Zhang (2011) Laplace transform. http://courseware.imu.edu.cn
Chelebus E, Ludwin W (1995) Is handoff traffic really Poissonian. In: IEEE ICUPC95, Tokyo, pp 348–353
Jedrzychi C, Leung VCM (1996) Probability distribution of channel holding time in cellular telephony systems. In: IEEE VTC96, pp 247–250
Fang Y (2001) Hyper—erlang distribution model and its application in wireless mobile networks. Wirel Netw 7:211–219
Zonoozi MM, Dassanayake P (1997) User mobility modeling and characterization of mobility patterns. IEEE J Sel Areas Commun 15(7), 1239–1252
Khan AS, Fisa N, Yusof SKS, Ariffin SHS, Esa M, Maarof NN, Abbas M (2010) An improved authentication key management scheme for multihop relay in IEEE 802.16m networks. In: IEEE Asia–Pacific conference on applied electromagnetics
Lee Y, Lee HK, Lee GY, Kim HJ, Jeong CK (2009) Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j. ACM
Rengaraju P, Lung C-H, Srinivasan A (2010) Design of distributed security architecture for multihop WiMAX networks. In: 2010 Eighth annual international conference on privacy, security and trust
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fanyang, Xiong, N. & Park, J.H. A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems. J Supercomput 61, 166–188 (2012). https://doi.org/10.1007/s11227-011-0655-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-011-0655-8