Skip to main content
Log in

Efficient pre-authentication scheme for inter-ASN handover in high mobility MANET

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Ensuring Quality of Service (QoS) and providing seamless connectivity are challenging in a mobile adhoc network. When Mobile Subscriber Station (MSS) moves between Access Service Network (ASNs), the authentication delay incurred during inter-ASN handover becomes a bottleneck. Pre-authentication of the MSSs at the target ASN (tASN) reduces the handover delay. Some existing pre-authentication schemes are prone to attacks. Modified EAP based Pre-authentication scheme using Improved ElGamal (MEPIE) proposed in this paper, modifies the existing Enhanced EAP based pre-Authentication scheme by using improved ElGamal digital signature and ElGamal encryption algorithm. To overcome the Denial of Service (DoS) and the replay attacks, MEPIE enhances ElGamal by using additional random variables. It outperforms the existing schemes in terms of Throughput, Packet Delivery Ratio (PDR), authentication delay, number of keys and Packet Loss Ratio (PLR) with negligible computation overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Aboba, B., & Calhoun, P. (2003). RADIUS support for EAP. IETF: Request for Comments.

    Google Scholar 

  2. Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (2004). Extensible authentication protocol (EAP), No. RFC 3748.

  3. Ali, K. N., Basheeruddin, M., Moinuddin, S. K., & Lakkars, R. (2010). Manipsec-ipsec in mobile ad-hoc networks. In Proceedings of 3rd IEEE international conference on computer science and information technology (vol. 1, pp. 635–639).

  4. Ammayappan, K., Sastry, V. N., & Negi, A. (2009). Authentication and dynamic key management protocol based on certified tokens for MANETs. In IEEE global mobile congress (pp. 1–6).

  5. Caballero-Gil, P., & Hernández-Goya, C. (2009). Self-organized authentication in mobile ad hoc networks. Journal of Communications and Networks, 11(5), 509–517.

    Article  Google Scholar 

  6. Chee, J., & Teo, M. (2011). Improving security in the IEEE 802.16 Standards. In Proceedings of the 8th international conference on information technology: New generations (pp. 408–412).

  7. Dahshan, H., & Irvine, J. (2008). Authenticated symmetric key distribution for mobile ad hoc networks. In Proceedings of the 5th IEEE international conference on mobile ad hoc and sensor systems (pp. 847–852).

  8. Dierks, T., & Rescorla, E. (2006). The transport layer security (TLS) protocol Version 1.1, RFC 4346.

  9. Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.

    Article  MathSciNet  Google Scholar 

  10. Dilli, R., & Reddy, P. C. S. (2016). Implementation of security features in MANETs using SHA-3 standard algorithm. In Proceedings of the IEEE international conference on computation system and information technology for sustainable solutions (pp. 455–458).

  11. Dutta, A., Zhang, T., Ohba, Y., Taniuchi, K., & Schulzrinne, H. (2005). MPA assisted optimized proactive handoff scheme. In Proceedings of the 2nd IEEE annual international conference on mobile and ubiquitous systems: Networking and services (pp. 155–165).

  12. Goldreich, O., Micali, S., & Wigderson, A. (1986). How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design. In Proceedings of the conference on the theory and application of cryptographic techniques (pp. 171–185). Berlin, Heidelberg: Springer.

  13. Hafslund, A., Andersson, J., & AS, T. N. (2005). 2-Level authentication mechanism in an internet connected MANET. In Proceedings of the 6th scandinavian workshop on wireless ad hoc networks, Johannesberg Estate.

  14. Hafslund, A., Tønnesen, A., Rotvik, R. B., Andersson, J., & Kure, Ø. (2004). Secure extension to the OLSR protocol. In OLSR interop and workshop (p. 1004).

  15. Hmouda, E., & Li, W. (2018). Detection and prevention of attacks in MANETs by improving the EAACK protocol. In Proceedings of the IEEE southeast conference (pp. 1–7).

  16. Hong, F., Hong, L., & Fu, C. (2005). Secure OLSR. In Proceedings of the 19th IEEE international conference on advanced information networking and applications, AINA 2005 (vol. 1, No. 713-718).

  17. Housley, R., & Aboba, B. (2006). Guidance for AAA key management. Draft-housley-aaa-key-mgmt-06, IETF Internet Draft.

  18. Hurley-Smith, D., Wetherall, J., & Adekunle, A. (2017). SUPERMAN: Security using pre-existing routing for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 16(10), 2927–2940.

    Article  Google Scholar 

  19. Hwu, J. S., Chen, R. J., & Lin, Y. B. (2006). An efficient identity-based cryptosystem for end-to-end mobile security. IEEE Transactions on Wireless Communications, 5(9), 2586–2593.

    Article  Google Scholar 

  20. IEEE 802 LAN/MAN Standards Committee. (1999). Wireless LAN medium access control MAC and physical layer (PHY) specifications: Spectrum and transmit power management extensions in the 5GHZ Band in Europe, draft supplement to IEEE Standard (p. 802).

  21. Jönsson, U., Alriksson, F., Larsson, T., Johansson, P., & Maguire Jr., G. Q. (2000). MIPMANET: Mobile IP for mobile ad hoc networks. In Proceedings of the 1st ACM international symposium on mobile ad hoc networking and computing (pp. 75–85).

  22. Kasra-Kermanshahi, S., & Salleh, M. (2015) A novel authentication scheme for mobile environments in the context of elliptic curve cryptography. In Proceedings of the IEEE international conference on computer, communications, and control technology (pp. 506–510).

  23. Kumar, K. M. M., Sunitha, N. R., Mathew, R., Veerayya, M., & Vijendra, C. (2016). Secure ad-hoc on-demand distance vector routing using identity based symmetric key management. In Proceedings of the IEEE international conference on wireless communications, signal processing and networking (pp. 1075–1081).

  24. Kolias, C., Kambourakis, G., & Gritzalis, S. (2013). Attacks and countermeasures on 802.16: analysis and assessment. IEEE Communications Surveys and Tutorials, 15(1), 487–514.

    Article  Google Scholar 

  25. Larafa, S., & Laurent, M. (2010). Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks. In Proceedings of the IEEE international conference on wireless communications, networking and information security (pp. 277–281).

  26. Larafa, S., & Laurent-Maknavicius, M. (2009). Protocols for distributed AAA framework in mobile ad-hoc networks. In Proceedings of the workshop on mobile and wireless networks security (pp. 75–86).

  27. Larafa, S., Laurent-Maknavicius, M., & Chaouchi, H. (2008). Light and distributed AAA scheme for mobile ad-hoc networks. In Proceedings of the 1st workshop on security of autonomous and spontaneous networks (pp. 93–103).

  28. Liu, D. Q., & Coslow, M. (2008). Extensible Authentication protocols for IEEE Standards 802.11 and 802.16. In Proceedings of the ACM international conference on mobile technology, applications and systems.

  29. Marin, R., Ruiz, P. M., Ros, F. J., Martinez, J. A., & Gomez, A. F. (2007). Pre-authentication based enhancement for access control in hybrid MANETs. In Proceedings of the 12th IEEE symposium on computers and communications (pp. 595–600).

  30. Maru, S., & Brown, T. X. (2008). Denial of service vulnerabilities in the 802.16 protocol. In Proceedings of the 4th ACM annual international conference on wireless internet.

  31. Mishra, A., Shin, M. H., Petroni, N. L., Clancy, T. C., & Arbaugh, W. A. (2004). Proactive key distribution using neighbor graphs. IEEE Wireless Communications, 11(1), 26–36.

    Article  Google Scholar 

  32. Neuman, B. C., & Ts’o, T. (1994). Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9), 33–38.

    Article  Google Scholar 

  33. Nguyen, T. D., Nguyen, T. D., & Tran, L. D. (2013). Attacks on low private exponent RSA: An experimental study. In Proceedings of the 13th international conference on computational science and its applications (pp. 162–165).

  34. Nguyen, T. N., & Ma, M. (2012). Enhanced EAP-based pre-authentication for fast and secure inter-ASN handovers in mobile WiMAX networks. IEEE Transactions on Wireless Communications, 11(6), 2173–2181.

    Article  Google Scholar 

  35. Nissar, N., Naja, N., & Jamali, A. (2017). Lightweight authentication-based scheme for AODV in ad-hoc networks. In Proceedings of the IEEE international conference on wireless technologies, embedded and intelligent systems (pp. 1–6).

  36. Pack, S., & Choi, Y. (2002). Fast inter-AP handoff using predictive authentication scheme in a public wireless LAN, networks (pp. 15–26).

  37. Pari, S. N., Jayapal, S., & Duraisamy, S. (2012). A trust system in MANET with secure key authentication mechanism. In Proceedings of the IEEE international conference on recent trends in information technology (pp. 261–265).

  38. Patidar, M., Sharma, M. K., & Bunglowala, A. (2014). Multilevel authentication for resource allotment in MANET. In Proceedings of the IEEE conference on IT in business, industry and government (pp. 1–4).

  39. Priana, M. E. (2014). Trust based clustering and secure authentication for multicast in ad-hoc network. International Journal of Computer Applications, 108(19), 54–63.

    Google Scholar 

  40. Qayyum, J., Lal, M., Khan, F., & Imad, M. (2011). Survey and assessment of WiMAX, its security threats and their solutions. International Journal of Video and Image Processing and Network Security, 11(3), 36–47.

    Google Scholar 

  41. Ravilla, D., & Putta, C. S. R. (2015). Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs. In Proceedings of the IEEE international conference on electronic design, computer networks and automated verification (pp. 154–159).

  42. Ruengsatra, T., Nakorn, K. N., Rojviboonchai, K., & Piromsopa, K. (2014). ETC: Effective trustworthy communication with two-mode authentication for disaster recovery. In Proceedings of the 10th IEEE international conference on information assurance and security (pp. 12–17).

  43. Saxena, N., Tsudik, G., & Yi, J. H. (2009). Efficient node admission and certificateless secure communication in short-lived MANETs. IEEE Transactions on Parallel and Distributed Systems, 20(2), 158–170.

    Article  Google Scholar 

  44. Shojaee, M., Movahhedinia, N., & Ladani, B. T. (2010). Traffic analysis for WiMAX network under DDoS attack. In Proceedings of the 2nd Pacific-Asia conference on circuits, communications and system (vol. 1, pp. 279–283).

  45. Simon, D., Aboba, B., & Hurst, R. (2010). The EAP-TLS Authentication Protocol, RFC 5216.

  46. Sridevi, B., & Rajaram, S. (2012). PKMv2–EAP authentication cost reduction of mobile WiMAX network entry process by the proposed key caching mechanisms. International Journal of Mobile Network Design and Innovation, 4(2), 65–75.

    Article  Google Scholar 

  47. Srividya, R., & Ramesh, B. (2015). Design of biometric authentication technique for MANET based emergency response system. In Proceedings of the IEEE international conference on electrical, computer and communication technologies (pp. 1–5).

  48. Suárez-Armas, J., Caballero-Gil, C., Rivero-García, A., & Caballero-Gil, P. (2018). Authentication and encryption for a robotic ad hoc network using identity-based cryptography. In Proceedings of the 4th IEEE international conference on big data innovations and applications (innovate-data) (pp. 71–76).

  49. Sun, H. M., Lin, Y. H., Chen, S. M., & Shen, Y. C. (2007). Secure and fast handover scheme based on pre-authentication method for 802.16/WiMAX infrastructure networks. In Proceedings of the IEEE region 10 conference (pp. 1–4).

  50. Xiaozhuo, G., Zhenhuan, C., & Yongming, W. (2015). How to get group key efficiently in mobile ad hoc networks? In Proceedings of the IEEE military communications conference (pp. 1009–1014).

  51. Xingliang, Z., & Shilian, X. (2012). A new authentication scheme for wireless ad hoc network. In Proceedings of the IEEE international conference on information management, innovation management and industrial engineering (vol. 2, pp. 312–315).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Deva Priya.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Deva Priya, M., Janakiraman, S., Sandhya, G. et al. Efficient pre-authentication scheme for inter-ASN handover in high mobility MANET. Wireless Netw 27, 893–907 (2021). https://doi.org/10.1007/s11276-019-02185-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-019-02185-2

Keywords

Navigation