Skip to main content
Log in

FSH scheme for high-speed handover and anti-MITM on mobile computing

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

As an IEEE 802.11-based mobile computing system has been established as the base structure of high-speed wireless network, interest in mobility and security of mobile terminal has increased. To reinforce security, 802.1x and 802.11i using EAP were used in standardized instrument. But it was found to be unsuitable for real time multimedia service because of the time delay. In this paper, we suggest Fast and Secure Handover (FSH) scheme which minimizes time delay in handover authentication process and prevents MITM (Man in the Middle) attack. This scheme carries out re-association process which is necessary for high-speed handover using Inter Access Point Protocol (IAPP) and Old_MSK. To make existing 802.1x-based user certification procedure suitable for high-speed handover, the terminal and pre-handover-accessed Old_AP make Rough_AP to prevent MITM. To do this, Old_AP uses the Old_MSK-used encrypted method which was used to encrypt MAC information of the mobile terminal and Old_AP. Hereby, FSH has been developed to become high-speed handover which has the 802.1x-supported security level and the skill of preventing MITM. In this paper, by simulation (NS-2), we confirmed the superiority in streaming service such as decreased handover time delay and VoIP.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. International Telecommunication Union (1988) General characteristics of international telephone connections and international telephone circuits. ITU-TG.114

  2. Shirdokar R, Kabara J, Krishnamurthy P (2001) A QoS-based indoor wireless data network design for VoIP. In: Vehicular Technology Conference, Oct 2001, VTC 2001 Fall. IEEE VTS 54th, vol 4, pp 2594–2598

    Google Scholar 

  3. Shin M, Mishra A, Arbaugh W (2004) Improving the latency of 802.11 hand-offs using neighbor graphs. In: Proceedings of the ACM MobiSys Conference, Boston, MA, June 2004

    Google Scholar 

  4. Kassab M, Bonnin J-M, Belghith A (2008) Fast and secure handover in WLANs: an evaluation of the signaling overhead. In: CCNC’08, January 2008

    Google Scholar 

  5. Lee C, Kim S, Oh H, Park C (2008) A group key based authentication protocol providing fast handoff in IEEE 802.11. Korea Inst Inf Secur Cryptol 18:103–113

    Google Scholar 

  6. Wienzek R, Persaud R (2006) Fast re-authentication for handovers in wireless communication networks. In: NETWORKING. LNCS, vol 3976. Springer, Berlin, pp 556–567

    Google Scholar 

  7. RFC 3788 (2004) Extensible Authentication Protocol (EAP)

  8. Mishra A, Shin M, Arbaugh W (2002) An empirical analysis of the IEEE 802.11 MAC layer handoff process. University of Maryland Technical Report, UMIACS-TR-2002-75

  9. Shin S, Rawat AS, Schulzrinne H (2004) Reducing MAC layer handoff. latency in IEEE 802.11 wireless LANs. In: ACM MobiWac’04, Oct 2004

    Google Scholar 

  10. (2001) http://grouper.ieee.org/groups/802/11/

  11. Robinson JW, Randhawa TS (2004) Saturation throughput analysis of IEEE 802.11e enhanced distributed coordination function. IEEE J Sel Areas Commun 22(5):917–928

    Article  Google Scholar 

  12. Security of the WEP Algorithm (2011) http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html

  13. Nakhjiri M, Nakhjiri M (2006) AAA and network security for mobile access radius, diameter, EAP, PKI and IP mobility. Wiley, New York

    Google Scholar 

  14. Fluhrer SR, Mantin I, Shamir A (2001) Weaknesses in the key scheduling algorithm of RC4. In: Selected Areas in Cryptography, 2001

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Young-Sik Jeong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Seo, S., Yeo, SS. & Jeong, YS. FSH scheme for high-speed handover and anti-MITM on mobile computing. J Supercomput 62, 118–133 (2012). https://doi.org/10.1007/s11227-011-0673-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-011-0673-6

Keywords

Navigation