Skip to main content
Log in

A wide-adapted bantam protocol for roaming across wireless areas

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

To guarantee stable convenience and feasibility of the widely applied wireless network, the handover technique is playing an important role nowadays to meet the epidemic mobile device usage. As is known, the wireless network authentication protocol can decide security for whole operating scheme and help protect rights of legal users, while there are still some flaws that prevent entire architecture from working favorably. Considering such flaws including computation overload as well as the key management burden, we propose a brand new authentication protocol to ensure secure message transmission and reduce computation overload. The proposed mechanism can be used both in the intra-domain and inter-domain, catering to the aim of decreasing management burden for the key distribution center and expediting the validation process efficiently. Furthermore, we provide the formal security analysis of BAN logic to demonstrate the applicability of the protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Aboba, B., & Simon, D. (1999). PPP EAP TLS authentication protocol. RFC 2716, IETF, October 1999. http://www.ietf.org/rfc/rfc2716.txt.

  2. Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (2004). Extensible authentication protocol (EAP). RFC 3748, IETF, June 2004. http://www.ietf.org/rfc/rfc3748.txt.

  3. Aboba, B., Simon, D., & Eronen, P. (2008). Extensible authentication protocol (EAP) key management framework. RFC 5247, IETF, August 2008. http://www.ietf.org/rfc/rfc5247.txt.

  4. Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36.

    Article  Google Scholar 

  5. Blunk, L., & Vollbrecht, J. (1998). PPP extensible authentication protocol (EAP). RFC 2284, IETF, March 1998. http://www.ietf.org/rfc/rfc2284.txt.

  6. Dantu, R., Clothier, G., & Atri, A. (2007). EAP methods for wireless networks. Computer Standards & Interfaces, 29(3), 289–301.

    Article  Google Scholar 

  7. Funk, P., & Blake-Wilson, S. (2008). Extensible authentication protocol tunneled transport layer security authenticated protocol version 0 (EAP-TTLSv0). RFC 5281, IETF, August 2008. http://www.ietf.org/rfc/rfc5281.txt.

  8. Huang, Y. L., Lu, P. H., Tygar, J. D., & Joseph, A. D. (2009). OSNP: Secure wireless authentication protocol using one-time key. Computers & Security, 28(8), 803–815.

    Article  Google Scholar 

  9. IEEE. (2001). IEEE 802.1X: Medium access control (MAC) security enhancements. June 2001.

  10. IEEE. (2003). IEEE 802.11i: Medium access control (MAC) security enhancements. May 2003.

  11. Liang, W., & Wang, W. Y. (2005). On performance analysis of challenge/response based authentication in wireless networks. Computer Networks, 48(2), 267–288.

    Article  MATH  Google Scholar 

  12. Lee, J. S., Lin, P. Y., & Chang, C. C. (2009). Lightweight secure roaming mechanism between GPRS/UMTS and wireless LANs. Wireless Personal Communications, 53(4), 569–580.

    Article  Google Scholar 

  13. Macnally, C. (2001). Cisco LEAP protocol description. September 2001. http://lists.cistron.nl/pipermail/cistron-radius/2001-September/002042.html.

  14. Ohba, Y., Das, S., & Dutta, A. (2007) Kerberized Handover keying: A media independent handover key management architecture. In Proceedings of the 2nd ACM/IEEE international workshop on mobility in the evolving internet architecture, Kyoto, Japan, No. 9, pp. 1–7, August 2007.

  15. Schneier, B. (1996). Applied cryptography (2nd ed.). New York: Wiley.

    Google Scholar 

  16. Syverson, P. F., & Cervesato, I. (2001). The logic of authentication protocols. Lecture Notes in Computer Science, 2171, 63–136.

    Article  Google Scholar 

  17. Stanley, D., Walker, J., & Aboba, B. (2005). Extensible authentication protocol (EAP) method requirements for wireless LANs. RFC 4017, IETF, March 2005. http://www.ietf.org/rfc/rfc4017.txt.

  18. Simon, D., Aboba, B., & Hurst, R. (2008). The EAP-TLS authentication protocol. RFC 5216, IETF, March 2008. http://www.ietf.org/rfc/rfc5216.txt.

  19. Tseng, Y. M. (2006). GPRS/UMTS—aided authentication protocol for wireless LANs. IEE Proceedings-Communications, 153(6), 810–817.

    Article  Google Scholar 

  20. Tseng, Y. M. (2009). USIM-based EAP-TLS authentication protocol for wireless local area networks. Computer Standards & Interfaces, 31(1), 128–136.

    Article  Google Scholar 

  21. Tsai, H. C., Chang, C. C., & Chang, K. J. (2009). Roaming across wireless local area networks using SIM-based authentication protocol. Computer Standards & Interfaces, 31, 381–389.

    Google Scholar 

  22. Wu, T. Y., & Tseng, Y. M. (2010). An efficient user authentication and key exchange protocol for mobile client–server environment. Computer Networks, 54(9), 1520–1530.

    Article  MATH  Google Scholar 

  23. Yang, C. C., Tang, Y. L., Wang, R. C., & Yang, H. W. (2005). A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation, 169(2), 1431–1439.

    Article  MathSciNet  MATH  Google Scholar 

  24. Yao, L., Wang, L., Kong, X. W., Wu, G. W., & Xia, F. (2010). An inter-domain authentication scheme for pervasive computing environment. Computers and Mathematics with Applications, 60(2), 234–244.

    Article  MathSciNet  MATH  Google Scholar 

  25. Chuang, M. C., & Lee, J. F. (2011). A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks. Computer Networks, 55(16), 3796–3809.

    Article  Google Scholar 

  26. Lee, T. F., & Hwang, T. (2011). Provably secure and efficient authentication techniques for the global mobility network. Journal of Systems and Software, 84(10), 1717–1725.

    Article  Google Scholar 

  27. Li, C. T., & Lee, C. C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55, 35–44.

    Article  MathSciNet  MATH  Google Scholar 

  28. The OpenSSL Project. http://www.openssl.org.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jung-San Lee.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, JS., Tseng, WT. A wide-adapted bantam protocol for roaming across wireless areas. Wireless Netw 19, 1423–1440 (2013). https://doi.org/10.1007/s11276-013-0542-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-013-0542-8

Keywords

Navigation