Abstract
This paper proposes an integrated handover authentication for NGN equipped with FMIPv6-based IP mobility over various kinds of access links. In ITU-T, an integrated authentication model has been introduced to support network attachment with mobility in NGN. Since existing studies for handover authentication have focused on the link layer or network layer respectively, there are additional authentication overhead such as duplicated authentication procedures and authentication messages delivery cost. The proposed integrated handover authentication contributes to reducing complexity of the authentication procedure and to enhancing the efficiency of it by means of the combined key management architecture; a mobile node generates a handover key to transfer it to the next access router through the AAA server, and hierarchical key management scheme addresses the locality of movement to authenticate the mobile node at the link layer. The evaluation of the handover authentication costs shows that it reduces the average number of handover authentication events and the authentication message delivery cost during moves in mobile networks. Also, the security aspects of the proposed scheme are discussed.
Similar content being viewed by others
References
ITU-T Recommendation Q.3201. (2007). EAP-based security signaling protocol architecture for network attachment.
Knightson K., Morita N., Towle T. (2005) NGN architecture: Generic principles, functional architecture, and implementation. IEEE Communications Magazine 43(10): 49–56
ITU-T Recommendation Y.2012. (2006). Functional requirements and architecture of the NGN of Release 1.
Koodli, R. (2009). Mobile IPv6 fast handovers. IETF RFC 5568.
IEEE Std 802.1x-2004. (2004). IEEE standards for local and metropolitan area networks—port-based network access control.
IEEE Std 802.16e. (2006). IEEE standards for local and metropolitan area networks, amendment 2: Physical and medium access control layers for combined fixed and mobile operation in licensed bands and corrigendum 1.
3GPP2 TSG-X (2006). Cdma2000 wireless IP network standard: Simple IP and mobile IP services, X.S0011-002-D v.1.0.
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (2005). Extensible authentication protocol (EAP). IETF RFC 3748.
Simon, D., Aboba, B., & Hurst, R. (2008). The EAP-TLS authentication protocol. IETF RFC 5216.
Arkko, J., & Haverinen, H. (2006). Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA). IETF RFC 4187.
McCann, P. (2005). Mobile IPv6 fast handovers for 802.11 networks. IETF RFC 4260.
Jang, H., Jee, J., Han, Y., Park, S., & Cha, J. (2008). Mobile IPv6 fast handovers over IEEE 802.16e networks. IETF RFC 5270.
Yokota, H., & Dommety, G. (2008). Mobile IPv6 fast handovers for 3G CDMA networks. IETF RFC 5271.
Mishra A., Shin M., Petroni N., Clancy T. Jr., Arbaugh W. (2004) Proactive key distribution using neighbor graphs. IEEE Wireless Communications 11(1): 26–36
Pack S., Choi Y. (2004) Fast handoff scheme based on mobility prediction in public wireless LAN systems. IEE Proceedings Communications 151(5): 489–495
Narayanan, V., Venkitaraman, N., Tschofenig, H., Giaretta, G., & Bournelle, J. (2007). Establishing handover keys using shared keys. IETF draft, draft-vidya-mipshop-handover-keys-aaa-04.
Kempf, J. & Koodli, R. (2008). Distributing a symmetric FMIPv6 handover key using secure neighbor discovery (SEND). IETF RFC 5269.
Choi J., Jung S. (2008) A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6. IEICE Transactions on Communications E91B(2): 605–608
Calhoun, P., Loughney, J., Guttman, E., Zorn, G., & Arkko, J. (2003). Diameter base protocol. IETF RFC 3588.
Rigney, C., Willens, S., Rubens, A., & Simpson, W. (2000). Remote authentication dial in user service (RADIUS). IETF RFC 2138.
Aura, T. (2005). Cryptographically generated addresses (CGA), IETF RFC 3972.
Aboba, B., Simon, D., & Eronen, P. (2008). Extensible authentication protocol (EAP) key management framework. IETF RFC 5247.
Menezes A., Oorschot P., Vanstone S. (1997) Handbook of applied cryptograph. CRC Press, New York
Chiang K., Shenoy N. (2004) A 2-D random-walk mobility model for location-management studies in wireless networks. IEEE Transactions on Vehicular Technology 53(2): 413–424
Rümmler R., Chung Y., Aghvami A. (2005) Modeling and analysis of an efficient multicast mechanism for UMTS. IEEE Transactions on Vehicular Technology 54(1): 350–365
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Choi, J., Jung, S. An Integrated Handover Authentication for FMIPv6 Over Heterogeneous Access Link Technologies. Wireless Pers Commun 71, 839–856 (2013). https://doi.org/10.1007/s11277-012-0847-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-012-0847-4