Abstract
To guarantee stable convenience and feasibility of the widely applied wireless network, the handover technique is playing an important role nowadays to meet the epidemic mobile device usage. As is known, the wireless network authentication protocol can decide security for whole operating scheme and help protect rights of legal users, while there are still some flaws that prevent entire architecture from working favorably. Considering such flaws including computation overload as well as the key management burden, we propose a brand new authentication protocol to ensure secure message transmission and reduce computation overload. The proposed mechanism can be used both in the intra-domain and inter-domain, catering to the aim of decreasing management burden for the key distribution center and expediting the validation process efficiently. Furthermore, we provide the formal security analysis of BAN logic to demonstrate the applicability of the protocol.
Similar content being viewed by others
References
Aboba, B., & Simon, D. (1999). PPP EAP TLS authentication protocol. RFC 2716, IETF, October 1999. http://www.ietf.org/rfc/rfc2716.txt.
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (2004). Extensible authentication protocol (EAP). RFC 3748, IETF, June 2004. http://www.ietf.org/rfc/rfc3748.txt.
Aboba, B., Simon, D., & Eronen, P. (2008). Extensible authentication protocol (EAP) key management framework. RFC 5247, IETF, August 2008. http://www.ietf.org/rfc/rfc5247.txt.
Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36.
Blunk, L., & Vollbrecht, J. (1998). PPP extensible authentication protocol (EAP). RFC 2284, IETF, March 1998. http://www.ietf.org/rfc/rfc2284.txt.
Dantu, R., Clothier, G., & Atri, A. (2007). EAP methods for wireless networks. Computer Standards & Interfaces, 29(3), 289–301.
Funk, P., & Blake-Wilson, S. (2008). Extensible authentication protocol tunneled transport layer security authenticated protocol version 0 (EAP-TTLSv0). RFC 5281, IETF, August 2008. http://www.ietf.org/rfc/rfc5281.txt.
Huang, Y. L., Lu, P. H., Tygar, J. D., & Joseph, A. D. (2009). OSNP: Secure wireless authentication protocol using one-time key. Computers & Security, 28(8), 803–815.
IEEE. (2001). IEEE 802.1X: Medium access control (MAC) security enhancements. June 2001.
IEEE. (2003). IEEE 802.11i: Medium access control (MAC) security enhancements. May 2003.
Liang, W., & Wang, W. Y. (2005). On performance analysis of challenge/response based authentication in wireless networks. Computer Networks, 48(2), 267–288.
Lee, J. S., Lin, P. Y., & Chang, C. C. (2009). Lightweight secure roaming mechanism between GPRS/UMTS and wireless LANs. Wireless Personal Communications, 53(4), 569–580.
Macnally, C. (2001). Cisco LEAP protocol description. September 2001. http://lists.cistron.nl/pipermail/cistron-radius/2001-September/002042.html.
Ohba, Y., Das, S., & Dutta, A. (2007) Kerberized Handover keying: A media independent handover key management architecture. In Proceedings of the 2nd ACM/IEEE international workshop on mobility in the evolving internet architecture, Kyoto, Japan, No. 9, pp. 1–7, August 2007.
Schneier, B. (1996). Applied cryptography (2nd ed.). New York: Wiley.
Syverson, P. F., & Cervesato, I. (2001). The logic of authentication protocols. Lecture Notes in Computer Science, 2171, 63–136.
Stanley, D., Walker, J., & Aboba, B. (2005). Extensible authentication protocol (EAP) method requirements for wireless LANs. RFC 4017, IETF, March 2005. http://www.ietf.org/rfc/rfc4017.txt.
Simon, D., Aboba, B., & Hurst, R. (2008). The EAP-TLS authentication protocol. RFC 5216, IETF, March 2008. http://www.ietf.org/rfc/rfc5216.txt.
Tseng, Y. M. (2006). GPRS/UMTS—aided authentication protocol for wireless LANs. IEE Proceedings-Communications, 153(6), 810–817.
Tseng, Y. M. (2009). USIM-based EAP-TLS authentication protocol for wireless local area networks. Computer Standards & Interfaces, 31(1), 128–136.
Tsai, H. C., Chang, C. C., & Chang, K. J. (2009). Roaming across wireless local area networks using SIM-based authentication protocol. Computer Standards & Interfaces, 31, 381–389.
Wu, T. Y., & Tseng, Y. M. (2010). An efficient user authentication and key exchange protocol for mobile client–server environment. Computer Networks, 54(9), 1520–1530.
Yang, C. C., Tang, Y. L., Wang, R. C., & Yang, H. W. (2005). A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation, 169(2), 1431–1439.
Yao, L., Wang, L., Kong, X. W., Wu, G. W., & Xia, F. (2010). An inter-domain authentication scheme for pervasive computing environment. Computers and Mathematics with Applications, 60(2), 234–244.
Chuang, M. C., & Lee, J. F. (2011). A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks. Computer Networks, 55(16), 3796–3809.
Lee, T. F., & Hwang, T. (2011). Provably secure and efficient authentication techniques for the global mobility network. Journal of Systems and Software, 84(10), 1717–1725.
Li, C. T., & Lee, C. C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55, 35–44.
The OpenSSL Project. http://www.openssl.org.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, JS., Tseng, WT. A wide-adapted bantam protocol for roaming across wireless areas. Wireless Netw 19, 1423–1440 (2013). https://doi.org/10.1007/s11276-013-0542-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-013-0542-8