Abstract
Providing secured and seamless service is one of the most important aspects of mobile networks, particularly for mobile WiMAX systems. However, the long delay handover schemes brought by the time-consuming EAP-based authentication may cause service disruption when a mobile WiMAX user moves between the coverage areas of different base stations. In this paper, we propose a handover scheme using symmetric key cryptography and pre-authentication approach to shorten the delay while ensuring high security level for Mobile WiMAX handover. The scheme is proven by BAN logic to achieve the security goals of an authentication scheme. A performance analysis is also carried out to show the effectiveness of this scheme in reducing handover delay and saving computational resources.
Similar content being viewed by others
References
IEEE Standard 802.16e (2005) In: Part 16: air interface for fixed and mobile broadband wireless access systems
Jatav VK, Singh V (2014) Mobile WiMAX network security threats and solutions: a survey. In: Proceedings of 2014 international conference computer and communication technology, pp 135–140
Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H (2004, 7 September 2011) Extensible Authentication Protocol (EAP). [RFC 3748]. http://tools.ietf.org/pdf/rfc3748.pdf
Narayanan V, Dondeti L (2008, 09 December 2010) EAP Extensions for EAP Re-authentication Protocol (ERP). [RFC 5296]. http://www.rfc-editor.org/rfc/rfc5296.txt
Aura T, Roe M (2005) Reducing reauthentication delay in wireless networks. In: Proceedings of first international conference on security and privacy for emerging areas in communications networks (SecureComm 2005), Athens, pp 139–148
Kim Y, Bahk S (2008) Enhancing security using the discarded security information in mobile WiMAX networks. In: 2008 IEEE global telecommunications conference, New Orleans, 2008, pp 1–5
Ohba Y, Wu Q, Zorn G (2010, 09 December 2010) Extensible Authentication Protocol (EAP) early authentication problem statement. [RFC 5836]. http://www.rfc-editor.org/rfc/rfc5836.txt
Sun HM, Lin YH, Chen SM, Shen YC (2007) Secure and fast handover scheme based on pre-authentication method for 802.16/WiMAX infrastructure networks. In: TENCON—Proceedings of IEEE region 10th annual international conference, Taipei, pp. 1–4
Junbeom H, Hyeongseop S, Pyung K, Hyunsoo Y, Nah-Oak S (2008) Security considerations for handover schemes in mobile WiMAX networks. In: 2008 IEEE wireless communications and networking conference, 31 March–3 April 2008, Piscataway, 2008, pp 2531–2536
Thuy Ngoc N, Maode M (2012) Enhanced EAP-based pre-authentication for fast and secure inter-ASN handovers in mobile WiMAX networks. IEEE Trans Wireless Commun 11:2173–2181
Tiwari H, Chaurasia BK (2014) In: Proceeding of 2014 fourth international conference on communication systems and network technologies (CSNT 2014), pp 669–672
Sarma A, Chakraborty S, Nandi S (2015) Deciding handover points based on context aware load balancing in a WiFi-WiMAX heterogeneous network environment. IEEE Trans Veh Technol PP(99):1–10
Rajule N, Ambudkar B (2015) Seamless and optimised vertical handover algorithm. In: Proceeding of 2015 international conference on computing communication control and automation (ICCUBEA 2015), pp 195–199
Liu C-Y, Leu F-Y, Liu J-C, Castiglione A, Palmieri F (2015) Heterogeneous network handover using 3GPP AND SF. In: Proceeding of 2015 IEEE 29th international conference on advanced information networking and applications (AINA 2015), pp 171–175
Simon D, Aboba B, Hurst R (2008, 09 December 2010) The EAP-TLS Authentication Protocol. [RFC 5216]. http://www.rfc-editor.org/rfc/rfc5216.txt
Zorn G (2010, 09 December 2010) RADIUS attributes for IEEE 802.16 Privacy Key Management Version 1 (PKMv1) Protocol support. [RFC 5904]. http://www.rfc-editor.org/rfc/rfc5904.txt
Dierks T, Rescorla E (2008, 09 December 2010) The Transport Layer Security (TLS) Protocol Version 1.2. [RFC 5246]. http://www.rfc-editor.org/rfc/rfc5246.txt
Zorn G, Zhang T, Walker J, Salowey J (2011, 30th August 2012) Cisco Vendor-Specific RADIUS attributes for the delivery of keying material. [RFC 6218]. http://tools.ietf.org/pdf/rfc6218.pdf
Burrows M, Abadi M, Needham RM (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36
Jonsson J, Kaliski B (2003, 11 December 2010) Public-key cryptography standards (PKCS) #1: RSA cryptography specifications Version 2.1. [RFC 3447]. http://www.rfc-editor.org/rfc/rfc3447.txt
(29 September 2012) Crypto++ 5.6.0 Benchmarks. http://www.cryptopp.com/benchmarks.html
Ye Y, Yi Q, Sharif H (2010) Performance analysis of IEEE 802.16e handover with RSA-based authentication. In: 2010 IEEE International Conference on Communications, ICC 2010 23-27 May 2010, Piscataway, p 5
Acknowledgments
This paper is supported by National Natural Science Foundation of China (the Number is 11171053) and Major State Basic Research Development Program of China (973 program, the Number is 2011CB302402).
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
The abbreviations of the terminologies
- WiMAX:
-
Worldwide interoperability for microwave access
- MS:
-
Mobile station
- BS:
-
Base station
- AS:
-
Authentic server
- ASN:
-
Access service networks
- tBS:
-
Target base station
- tASN:
-
Target access service networks
- EAP:
-
Extensible authentication protocol
- HO:
-
Handover
- ERP:
-
EAP-based re-authentication protocol
- EMSK:
-
Extended master session key
- MSK:
-
Master session key
- EPA:
-
EAP-based pre-authentication scheme
- PMKs:
-
Pair-wise master keys
- nBSs:
-
Neighbor BSs
- EEP:
-
Enhanced EAP-based pre-authentication scheme
- HetNet:
-
Heterogeneous network
- SKEP:
-
Symmetric keys for EAP-based pre-authentication protocol
- NAP:
-
Network access provider
- CSNs:
-
Connectivity service networks
- NSP:
-
Network service provider
- EAP-TLS:
-
EAP transport layer security
- SA- TEK:
-
Security association-traffic encryption key
- PIK:
-
Pre-authentication integrity key
- HMACs:
-
Hash-based message authentication codes
- PEK:
-
Pre-authentication encryption key
- PMS:
-
Pre-master secret
- AK:
-
Authorization key
Rights and permissions
About this article
Cite this article
Zhou, J., Ma, M., Feng, Y. et al. A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks. J Supercomput 72, 2734–2751 (2016). https://doi.org/10.1007/s11227-015-1581-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-015-1581-y