Skip to main content
Log in

Enhancing the performance of secured handover protocols in UMTS-WiMAX interworking

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Interworking UMTS and WiMAX networks offers global roaming and cost effective broadband wireless Internet access. Designing efficient Intra and Inter WiMAX handovers in the interworking architecture is a challenging problem. Handovers must be instantaneous and secure at the same time. We attempt to solve this problem by designing Intra and Inter WiMAX handover protocols which are capable of operating in the UMTS-WiMAX interworking architecture and perform mutual pre-authentication between the mobile station and the target network prior to handover. Due to the pre-authentication procedure, our proposed handover protocols outperform standard handover protocols by dispatching fewer handover signaling messages, experiencing less handover delay and preserving computation resources of critical nodes in the interworking architecture. Furthermore, our proposed handover protocols meet essential security requirements and defend against common attacks affecting handover protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. The 3rd Generation Partnership Project (3GPP), www.3gpp.org.

  2. IEEE Standard for local and metropolitan area networks, Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std 802.16-2004, Oct. 2004.

  3. IEEE Standard for local and metropolitan area networks, Air Interface for Fixed Broadband Wireless Access Systems, Part 16, Amendment 2 and Corrigendum 1, IEEE Std 802.16e-2005 and IEEE Std 802.16-2004/Cor1-2005.

  4. The WiMAX Forum, www.wimaxforum.org.

  5. Munasinghe, K., & Jamalipour, A. (2009). Interworked WiMAX-3G Cellular Data Networks: An architecture for mobility management and performance evaluation. IEEE Transactions on Wireless Communications, Vol. 8, No. 4, pp. 1847–1853, Apr. 2009.

  6. Xu, F., Zhang, L., & Zheng, Z. (2007). Interworking of WiMAX and 3GPP Networks based on IMS, IEEE Comm. Magazine, Vol. 45, pp. 144–150, Mar. 2007.

  7. Nguyen-Vuong, Q.-T., Fiat, L., & Agoulmine, N. (2006). An Architecture for UMTS-WIMAX Interworking. In Proceedings of 1st International Workshop on Broadband Convergence Networks (BcN’06), Canada, Apr. 2006.

  8. Peng, M., & Wang, W. (2007). A unified architecture and key techniques for interworking between WiMAX and Beyond 3G/4G Systems. International Journal of Wireless Personal Communications, Springer, Vol. 45, Issue 1, pp. 67–90, Oct. 2007.

  9. 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3GPP system to Wireless Local Area Network interworking, System description (Release 7), 3GPP TS 23.234 v.7.2.0, Jun. 2006.

  10. WiMAX Forum Network Architecture—Stage 2 Architecture Tenets, Reference Model and Reference Points [3GPP–WiMAX Interworking], WiMAX Forum, Rel. 1, ver. 1.2, Jan. 2008.

  11. WiMAX Forum Network Architecture–Stage 3 Detailed Protocols and Procedures, WiMAX Forum, Rel. 1, ver. 1.2, Jan. 2008.

  12. Arkko, J., & Haverinen, H. (2006). Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA), IETF RFC 4187, Jan. 2006.

  13. Kambourakis, G., Rouskas, A., & Gritzalis, S. (2004). Advanced SSL/TLS-based authentication for secure WLAN-3G Interworking. IEE Comm. Proc., vol. 151, issue. 5, pp. 501–506.

  14. Prasithsangaree, P. & Krishnamurthy, P. (2004). A new authentication mechanism for loosely coupled 3G-WLAN integrated networks. IEEE 59th Vehicular Technology Conference. vol. 5, pp. 2998–3003, Spring 2004.

  15. AVISPA—Automated Validation of Internet Security Protocols, http://www.avispa-project.org.

  16. Rigney, C., Willens, S., Rubens, A., & Simpson, W. (2000). Remote Authentication Dial In User Service (RADIUS), IETF RFC 2865, Jun. 2000.

  17. Clancy, T., Nakhjiri, M., Narayanan, V., & Dondeti, L. (2008). Handover key management and re-authentication problem statement. IETF RFC 5169, Mar. 2008.

  18. Housley, R., & Aboba, B. (2007). Guidance for authentication, authorization and accounting (AAA) key management. IETF RFC 4962, Jul. 2007.

  19. Lee, S.-H., Park, N.-S., & Choi, J.-Y. (2008). Secure Handover for Mobile WiMAX Networks. IEICE Trans.on Info. and Sys., vol. E91-D, no. 12, Dec 2008.

  20. Hur, J., Shim, H., Kim, P., Yoon, H., & Song, N.-O. (2008). Security considerations for handover schemes in mobile WiMAX networks. In Proc. of Wireless Comm. and Net. Conf. 2008 (WCNC08), pp. 2531–2536, Mar. 31–Apr. 3 2008.

  21. Jiao, W., Jiang, P., & Ma, Y. (2007). Fast handover scheme for real-time applications in mobile WiMAX. In Proc. of Int. Conf. on Comm. 2007 (ICC07), pp. 6038–6042, Jun 2007.

  22. Sultan, J., Ismail, M., Misran, N., & Jumari, K. (2008). Spectral efficiency evaluation of downlink mobile multi-HOP relay system employing macro diversity handover technique. International Journal of Computer Science and Network Security, vol. 8, no. 5, May 2008.

  23. Sun, H.-M., Lin, Y.-H., Chen, S.-M., & Shen, Y.-C. (2007). Secure and fast handover scheme based on pre-authentication method for 802.16/WiMAX infrastructure networks. In Proc. of Region 10 Conf. 2007 (TENCON07), Oct. 30 2007–Nov. 2 2007.

  24. Zhang, M., & Fang, Y. (2005). Security analysis and enhancements of 3GPP AKA protocol. IEEE Transactions on Wireless Communications, vol. 4, p. 734–742, Mar. 2005.

  25. Choi, S., Hwang, G.-H., & Kwon, T. (2005). Fast handover scheme for real-time downlink services in IEEE 802.16e BWA System. In Proceedings of IEEE Vehicular Technology Conference 2007 (VTC 2007), Vol. 3, pp. 2028–2032, Sweden, May 2005.

  26. Lee, D., Kyamakya, K., & Umondi, J. (2006). Fast handover algorithm for IEEE 802.16e broadband wireless access system. In Proceedings of 1st International Symposium on Wireless Pervasive Computing 2006 (ISWPC 2006), Jan. 2006.

  27. Yeh, J.-H., Chen, J.-C., & Agrawal, P. (2009). Fast intra-network and cross-layer handover (FINCH) for WiMAX and mobile internet. IEEE Transactions on Mobile Computing. Vol. 8, No. 4, pp. 558–574, Apr. 2009.

  28. Chang, C.-K., & Huang, C.-T. (2007). Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks. In Proceedings of the International Conference on Parallel Processing Workshops 2007 (ICPPW 2007), Sep. 2007.

  29. Dong, G., & Dai, J. (2007). An improved handover algorithm for scheduling services in IEEE802.16e. In Proceedings of IEEE Mobile WIMAX Symposium, pp. 38–42, Mar. 2007.

  30. Hsu, S.-F., & Lin, Y.-B. (2009). A key caching mechanism for reducing WiMAX authentication cost in handoff. IEEE Transactions on Vehicular Technology. Vol. 58, No. 8, pp. 4507–4513, Oct. 2009.

  31. Mohan, S. (1996). Privacy and authentication protocols for PCS. IEEE Personal Comm., vol. 3, issue. 5, pp. 34–38, Oct. 1996.

  32. Pack, S., & Lee, W. (2008). Dual home agent (DHA)-based location management scheme in integrated cellular-WLAN networks. Comp. Net., vol. 52, no. 17, pp. 3273–3283, Elsevier, 2008.

  33. Kassab, M., Bonnin, J., & Belghith, A. (2008). Fast and secure handover in WLANs: An evaluation of the signaling overhead. In Proceedings of IEEE CCNC 2008, pp. 770–775, Jan 2008.

  34. 3rd Generation Partnership Project, 3GPP Technical Specifications, 3G Security; Security architecture (Release 7), 3GPP TS 33.102 v7.0.0, Dec. 2005.

  35. Choi, H.-H., Song, O., & Cho, D.-H. (2006). Seamless handoff scheme based on pre-registration and pre-authentication for UMTS-WLAN Interworking. International Journal of Wireless Personal Communication, vol. 41, issue 3, pp. 345–364, 2006.

  36. Hess, A., & Schäfer, G. (2002). Performance evaluation of AAA/Mobile IP Authentication. In Proceedings of 2nd Polish-German Teletraffic Symposium (PGTS’02), Poland, Sep. 2002.

  37. Lim, S.-H., Bang, K.-S., Yi, O., & Lim, J. (2007). A secure handover protocol design in wireless networks with formal verification. Lecture Notes in Computer Science 4517, pp. 67–78, Springer Berlin Heidelberg 2007.

  38. Marin, R., Fernandez, P., & Gomez, A. (2007) 3-Party Approach for Fast Handover in EAP-Based Wireless Networks. Lecture Notes in Computer Science 4804, pp. 1734–1751, Springer Berlin Heidelberg 2007.

  39. Marques, R. & Zúquete, A. (2008) Fast, Secure Handovers in 802.11: Back to the Basis. In Proceedings of 4th ACM symposium on QoS and Security for wireless and mobile network, pp. 27–34, Oct. 2008.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Al Shidhani.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Al Shidhani, A., Leung, V.C.M. Enhancing the performance of secured handover protocols in UMTS-WiMAX interworking. Wireless Netw 16, 1929–1943 (2010). https://doi.org/10.1007/s11276-010-0236-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-010-0236-4

Keywords

Navigation