Abstract
As an IEEE 802.11-based mobile computing system has been established as the base structure of high-speed wireless network, interest in mobility and security of mobile terminal has increased. To reinforce security, 802.1x and 802.11i using EAP were used in standardized instrument. But it was found to be unsuitable for real time multimedia service because of the time delay. In this paper, we suggest Fast and Secure Handover (FSH) scheme which minimizes time delay in handover authentication process and prevents MITM (Man in the Middle) attack. This scheme carries out re-association process which is necessary for high-speed handover using Inter Access Point Protocol (IAPP) and Old_MSK. To make existing 802.1x-based user certification procedure suitable for high-speed handover, the terminal and pre-handover-accessed Old_AP make Rough_AP to prevent MITM. To do this, Old_AP uses the Old_MSK-used encrypted method which was used to encrypt MAC information of the mobile terminal and Old_AP. Hereby, FSH has been developed to become high-speed handover which has the 802.1x-supported security level and the skill of preventing MITM. In this paper, by simulation (NS-2), we confirmed the superiority in streaming service such as decreased handover time delay and VoIP.
Similar content being viewed by others
References
International Telecommunication Union (1988) General characteristics of international telephone connections and international telephone circuits. ITU-TG.114
Shirdokar R, Kabara J, Krishnamurthy P (2001) A QoS-based indoor wireless data network design for VoIP. In: Vehicular Technology Conference, Oct 2001, VTC 2001 Fall. IEEE VTS 54th, vol 4, pp 2594–2598
Shin M, Mishra A, Arbaugh W (2004) Improving the latency of 802.11 hand-offs using neighbor graphs. In: Proceedings of the ACM MobiSys Conference, Boston, MA, June 2004
Kassab M, Bonnin J-M, Belghith A (2008) Fast and secure handover in WLANs: an evaluation of the signaling overhead. In: CCNC’08, January 2008
Lee C, Kim S, Oh H, Park C (2008) A group key based authentication protocol providing fast handoff in IEEE 802.11. Korea Inst Inf Secur Cryptol 18:103–113
Wienzek R, Persaud R (2006) Fast re-authentication for handovers in wireless communication networks. In: NETWORKING. LNCS, vol 3976. Springer, Berlin, pp 556–567
RFC 3788 (2004) Extensible Authentication Protocol (EAP)
Mishra A, Shin M, Arbaugh W (2002) An empirical analysis of the IEEE 802.11 MAC layer handoff process. University of Maryland Technical Report, UMIACS-TR-2002-75
Shin S, Rawat AS, Schulzrinne H (2004) Reducing MAC layer handoff. latency in IEEE 802.11 wireless LANs. In: ACM MobiWac’04, Oct 2004
Robinson JW, Randhawa TS (2004) Saturation throughput analysis of IEEE 802.11e enhanced distributed coordination function. IEEE J Sel Areas Commun 22(5):917–928
Security of the WEP Algorithm (2011) http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
Nakhjiri M, Nakhjiri M (2006) AAA and network security for mobile access radius, diameter, EAP, PKI and IP mobility. Wiley, New York
Fluhrer SR, Mantin I, Shamir A (2001) Weaknesses in the key scheduling algorithm of RC4. In: Selected Areas in Cryptography, 2001
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Seo, S., Yeo, SS. & Jeong, YS. FSH scheme for high-speed handover and anti-MITM on mobile computing. J Supercomput 62, 118–133 (2012). https://doi.org/10.1007/s11227-011-0673-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-011-0673-6