Abstract
Ensuring Quality of Service (QoS) and providing seamless connectivity are challenging in a mobile adhoc network. When Mobile Subscriber Station (MSS) moves between Access Service Network (ASNs), the authentication delay incurred during inter-ASN handover becomes a bottleneck. Pre-authentication of the MSSs at the target ASN (tASN) reduces the handover delay. Some existing pre-authentication schemes are prone to attacks. Modified EAP based Pre-authentication scheme using Improved ElGamal (MEPIE) proposed in this paper, modifies the existing Enhanced EAP based pre-Authentication scheme by using improved ElGamal digital signature and ElGamal encryption algorithm. To overcome the Denial of Service (DoS) and the replay attacks, MEPIE enhances ElGamal by using additional random variables. It outperforms the existing schemes in terms of Throughput, Packet Delivery Ratio (PDR), authentication delay, number of keys and Packet Loss Ratio (PLR) with negligible computation overhead.
Similar content being viewed by others
References
Aboba, B., & Calhoun, P. (2003). RADIUS support for EAP. IETF: Request for Comments.
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (2004). Extensible authentication protocol (EAP), No. RFC 3748.
Ali, K. N., Basheeruddin, M., Moinuddin, S. K., & Lakkars, R. (2010). Manipsec-ipsec in mobile ad-hoc networks. In Proceedings of 3rd IEEE international conference on computer science and information technology (vol. 1, pp. 635–639).
Ammayappan, K., Sastry, V. N., & Negi, A. (2009). Authentication and dynamic key management protocol based on certified tokens for MANETs. In IEEE global mobile congress (pp. 1–6).
Caballero-Gil, P., & Hernández-Goya, C. (2009). Self-organized authentication in mobile ad hoc networks. Journal of Communications and Networks, 11(5), 509–517.
Chee, J., & Teo, M. (2011). Improving security in the IEEE 802.16 Standards. In Proceedings of the 8th international conference on information technology: New generations (pp. 408–412).
Dahshan, H., & Irvine, J. (2008). Authenticated symmetric key distribution for mobile ad hoc networks. In Proceedings of the 5th IEEE international conference on mobile ad hoc and sensor systems (pp. 847–852).
Dierks, T., & Rescorla, E. (2006). The transport layer security (TLS) protocol Version 1.1, RFC 4346.
Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
Dilli, R., & Reddy, P. C. S. (2016). Implementation of security features in MANETs using SHA-3 standard algorithm. In Proceedings of the IEEE international conference on computation system and information technology for sustainable solutions (pp. 455–458).
Dutta, A., Zhang, T., Ohba, Y., Taniuchi, K., & Schulzrinne, H. (2005). MPA assisted optimized proactive handoff scheme. In Proceedings of the 2nd IEEE annual international conference on mobile and ubiquitous systems: Networking and services (pp. 155–165).
Goldreich, O., Micali, S., & Wigderson, A. (1986). How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design. In Proceedings of the conference on the theory and application of cryptographic techniques (pp. 171–185). Berlin, Heidelberg: Springer.
Hafslund, A., Andersson, J., & AS, T. N. (2005). 2-Level authentication mechanism in an internet connected MANET. In Proceedings of the 6th scandinavian workshop on wireless ad hoc networks, Johannesberg Estate.
Hafslund, A., Tønnesen, A., Rotvik, R. B., Andersson, J., & Kure, Ø. (2004). Secure extension to the OLSR protocol. In OLSR interop and workshop (p. 1004).
Hmouda, E., & Li, W. (2018). Detection and prevention of attacks in MANETs by improving the EAACK protocol. In Proceedings of the IEEE southeast conference (pp. 1–7).
Hong, F., Hong, L., & Fu, C. (2005). Secure OLSR. In Proceedings of the 19th IEEE international conference on advanced information networking and applications, AINA 2005 (vol. 1, No. 713-718).
Housley, R., & Aboba, B. (2006). Guidance for AAA key management. Draft-housley-aaa-key-mgmt-06, IETF Internet Draft.
Hurley-Smith, D., Wetherall, J., & Adekunle, A. (2017). SUPERMAN: Security using pre-existing routing for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 16(10), 2927–2940.
Hwu, J. S., Chen, R. J., & Lin, Y. B. (2006). An efficient identity-based cryptosystem for end-to-end mobile security. IEEE Transactions on Wireless Communications, 5(9), 2586–2593.
IEEE 802 LAN/MAN Standards Committee. (1999). Wireless LAN medium access control MAC and physical layer (PHY) specifications: Spectrum and transmit power management extensions in the 5GHZ Band in Europe, draft supplement to IEEE Standard (p. 802).
Jönsson, U., Alriksson, F., Larsson, T., Johansson, P., & Maguire Jr., G. Q. (2000). MIPMANET: Mobile IP for mobile ad hoc networks. In Proceedings of the 1st ACM international symposium on mobile ad hoc networking and computing (pp. 75–85).
Kasra-Kermanshahi, S., & Salleh, M. (2015) A novel authentication scheme for mobile environments in the context of elliptic curve cryptography. In Proceedings of the IEEE international conference on computer, communications, and control technology (pp. 506–510).
Kumar, K. M. M., Sunitha, N. R., Mathew, R., Veerayya, M., & Vijendra, C. (2016). Secure ad-hoc on-demand distance vector routing using identity based symmetric key management. In Proceedings of the IEEE international conference on wireless communications, signal processing and networking (pp. 1075–1081).
Kolias, C., Kambourakis, G., & Gritzalis, S. (2013). Attacks and countermeasures on 802.16: analysis and assessment. IEEE Communications Surveys and Tutorials, 15(1), 487–514.
Larafa, S., & Laurent, M. (2010). Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks. In Proceedings of the IEEE international conference on wireless communications, networking and information security (pp. 277–281).
Larafa, S., & Laurent-Maknavicius, M. (2009). Protocols for distributed AAA framework in mobile ad-hoc networks. In Proceedings of the workshop on mobile and wireless networks security (pp. 75–86).
Larafa, S., Laurent-Maknavicius, M., & Chaouchi, H. (2008). Light and distributed AAA scheme for mobile ad-hoc networks. In Proceedings of the 1st workshop on security of autonomous and spontaneous networks (pp. 93–103).
Liu, D. Q., & Coslow, M. (2008). Extensible Authentication protocols for IEEE Standards 802.11 and 802.16. In Proceedings of the ACM international conference on mobile technology, applications and systems.
Marin, R., Ruiz, P. M., Ros, F. J., Martinez, J. A., & Gomez, A. F. (2007). Pre-authentication based enhancement for access control in hybrid MANETs. In Proceedings of the 12th IEEE symposium on computers and communications (pp. 595–600).
Maru, S., & Brown, T. X. (2008). Denial of service vulnerabilities in the 802.16 protocol. In Proceedings of the 4th ACM annual international conference on wireless internet.
Mishra, A., Shin, M. H., Petroni, N. L., Clancy, T. C., & Arbaugh, W. A. (2004). Proactive key distribution using neighbor graphs. IEEE Wireless Communications, 11(1), 26–36.
Neuman, B. C., & Ts’o, T. (1994). Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9), 33–38.
Nguyen, T. D., Nguyen, T. D., & Tran, L. D. (2013). Attacks on low private exponent RSA: An experimental study. In Proceedings of the 13th international conference on computational science and its applications (pp. 162–165).
Nguyen, T. N., & Ma, M. (2012). Enhanced EAP-based pre-authentication for fast and secure inter-ASN handovers in mobile WiMAX networks. IEEE Transactions on Wireless Communications, 11(6), 2173–2181.
Nissar, N., Naja, N., & Jamali, A. (2017). Lightweight authentication-based scheme for AODV in ad-hoc networks. In Proceedings of the IEEE international conference on wireless technologies, embedded and intelligent systems (pp. 1–6).
Pack, S., & Choi, Y. (2002). Fast inter-AP handoff using predictive authentication scheme in a public wireless LAN, networks (pp. 15–26).
Pari, S. N., Jayapal, S., & Duraisamy, S. (2012). A trust system in MANET with secure key authentication mechanism. In Proceedings of the IEEE international conference on recent trends in information technology (pp. 261–265).
Patidar, M., Sharma, M. K., & Bunglowala, A. (2014). Multilevel authentication for resource allotment in MANET. In Proceedings of the IEEE conference on IT in business, industry and government (pp. 1–4).
Priana, M. E. (2014). Trust based clustering and secure authentication for multicast in ad-hoc network. International Journal of Computer Applications, 108(19), 54–63.
Qayyum, J., Lal, M., Khan, F., & Imad, M. (2011). Survey and assessment of WiMAX, its security threats and their solutions. International Journal of Video and Image Processing and Network Security, 11(3), 36–47.
Ravilla, D., & Putta, C. S. R. (2015). Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs. In Proceedings of the IEEE international conference on electronic design, computer networks and automated verification (pp. 154–159).
Ruengsatra, T., Nakorn, K. N., Rojviboonchai, K., & Piromsopa, K. (2014). ETC: Effective trustworthy communication with two-mode authentication for disaster recovery. In Proceedings of the 10th IEEE international conference on information assurance and security (pp. 12–17).
Saxena, N., Tsudik, G., & Yi, J. H. (2009). Efficient node admission and certificateless secure communication in short-lived MANETs. IEEE Transactions on Parallel and Distributed Systems, 20(2), 158–170.
Shojaee, M., Movahhedinia, N., & Ladani, B. T. (2010). Traffic analysis for WiMAX network under DDoS attack. In Proceedings of the 2nd Pacific-Asia conference on circuits, communications and system (vol. 1, pp. 279–283).
Simon, D., Aboba, B., & Hurst, R. (2010). The EAP-TLS Authentication Protocol, RFC 5216.
Sridevi, B., & Rajaram, S. (2012). PKMv2–EAP authentication cost reduction of mobile WiMAX network entry process by the proposed key caching mechanisms. International Journal of Mobile Network Design and Innovation, 4(2), 65–75.
Srividya, R., & Ramesh, B. (2015). Design of biometric authentication technique for MANET based emergency response system. In Proceedings of the IEEE international conference on electrical, computer and communication technologies (pp. 1–5).
Suárez-Armas, J., Caballero-Gil, C., Rivero-García, A., & Caballero-Gil, P. (2018). Authentication and encryption for a robotic ad hoc network using identity-based cryptography. In Proceedings of the 4th IEEE international conference on big data innovations and applications (innovate-data) (pp. 71–76).
Sun, H. M., Lin, Y. H., Chen, S. M., & Shen, Y. C. (2007). Secure and fast handover scheme based on pre-authentication method for 802.16/WiMAX infrastructure networks. In Proceedings of the IEEE region 10 conference (pp. 1–4).
Xiaozhuo, G., Zhenhuan, C., & Yongming, W. (2015). How to get group key efficiently in mobile ad hoc networks? In Proceedings of the IEEE military communications conference (pp. 1009–1014).
Xingliang, Z., & Shilian, X. (2012). A new authentication scheme for wireless ad hoc network. In Proceedings of the IEEE international conference on information management, innovation management and industrial engineering (vol. 2, pp. 312–315).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Deva Priya, M., Janakiraman, S., Sandhya, G. et al. Efficient pre-authentication scheme for inter-ASN handover in high mobility MANET. Wireless Netw 27, 893–907 (2021). https://doi.org/10.1007/s11276-019-02185-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-019-02185-2