Abstract
In heterogeneous networks, mobile nodes face long authentication delays, affecting the throughput and the duration for the entire authentication process increases considerably. The ultimate reduction in the processing time on authentication procedure is required for a smooth and seamless hand over. Authentication delay occurs because of key exchange between administrative domains. It is noticeable that as the number of mobile nodes requesting authentication increases, the operating cost of the authentication process also increases which turns into a big key challenging problem. The interoperability of dissimilar next generation networks will lead to better data rates, good spectrum efficiency and excellent serviceability to mobile users. Several factors cause decline in the quality of service and increase in handover delay. The proposed research work aims at developing an efficient authentication technique that improves the security of data transmission in heterogeneous network.
Similar content being viewed by others
Data Availability
The authors confirm that the data and material supporting the finding of this study are available within the article.
Code Availability
The codes that support the finding of this study are available from the corresponding author upon reasonable request.
References
Shidhani, A. A., & Leung, V. C. M. (2008). Local fast re-authentication for 3G-WLAN interworking. Security and Communication Networks, 1(4), 309–323.
Al Shidhani, A., & Leung, V. C. M. (2008). Reducing re-authentication delays during UMTS-WLAN vertical handovers. In 2008 IEEE 19th international symposium on personal, indoor and mobile radio communications (pp. 1–5). https://doi.org/10.1109/PIMRC.2008.4699796
Huang, Y. H., & Chen, Y.-C. (2010). A cross-layer media-independent Handover scheme in heterogeneous WiMAX/WiFi networks. In Proceedings of the 8th International Network Conference, INC 2010 (pp. 121–130).
Huang, Y.-L., Shen, C. Y., Shieh, S., Wang, H.-J., & Lin, C.-C. (2009). Provable secure AKA scheme with reliable key delegation in UMTS. In Third IEEE international conference on secure software integration and reliability improvement (pp. 243–252).
Pontes, A., Silva, D., Jailton, J., Rodrigues, O., & Dias, K. (2008). Handover management in integrated WLAN and mobile WiMAX networks. IEEE Wireless Communications, 15(5), 86–95.
Cao, L., Liu, Y., & Cao, S. (2019). An authentication protocol in LTE-WLAN heterogeneous converged network based on certificateless sign crypton scheme with identity privacy protection. IEEE Access, 7, 139001–139012.
Shen, S.-S., Lin, S.-H., & Chiu, J.-H. (2014). Fast handover pre-authentication protocol in 3GPPWLAN heterogeneous mobile networks. International Journal on Communications, Network and System Sciences, 7(4), 101–113. https://doi.org/10.4236/ijcns.2014.74012
Wang, S., Cao, Z., & Cao, F. (2008). Efficient identity-based authenticated key agreement protocol with PKG forward secrecy. International Journal of Network Security, 7(2), 181–186.
Arkko, J., & Haverinen, H. (2006). Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA). In IETF, RFC 4187.
Rai, A. K., Mishra, S., & Kumar, V. (2010). Strong password based EAP-TLS authentication protocol for WiMAX. International Journal on Computer Science and Engineering, 2(8), 2736–2741.
Lai, C., Li, H., Lu, R., & Shen, X. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57, 3492–3510.
Choi, D., Choi, H.-K., & Lee, S.-Y. (2015). A group-based security protocol for machine-type communications in LTE- advanced. Wireless Networks, 21(2), 405–419.
Alezabi, K. A., Hashim, F., Hashim, S., & Ali, B. M. (2014). An efficient authentication and key agreement protocol for 4G (LTE) networks. In IEEE Region 10 Symposium (pp. 502–507). https://doi.org/10.1109/TENCONSpring.2014.6863085
Mun, H., Han, K., & Kim, K. (2009). 3G-WLAN interworking: Security analysis and new authentication and key agreement based on EAP AKA. In Proceedings of WTS’09, Prague, Czech (pp. 1–8)
Potlapally, N. R., Ravi, S., Raghunathan, A., & Jha, N. K. (2006). A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing, 5(2), 128–143.
Qachri, N., Markowitch, O., & Dricot, J.-M. (2013). A formally verified protocol for secure vertical handovers in 4G heterogeneous networks. International Journal of Security and Its Applications, 7(6), 309–326. https://doi.org/10.14257/ijsia.2013.7.6.32
Urien, P., & Dandjinou, M. (2006). Designing smartcards for emerging wireless networks. In Series lecture notes in smart card research and advanced applications (Vol. 3928, pp. 165–178)
Hamada, R. A., Ali, H. S., & Abdalla, M. I. (2014). SIP-based mobility management for LTE-WiMAX-WLAN interworking using IMS architecture. International Journal of Computer Networks, 6(1), 1–14.
Lin, S.-H., Chiu, J.-H., & Shen, S.-S. (2011). A fast iterative localized re-authentication protocol for UMTS-WLAN heterogeneous mobile communication networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), 1.
Simon, D., Aboba, B., & Hurst, R. (2008). The EAP-TLS authentication protocol. In RFC 5216.
Jang, U., Lim, H., & Kim, H. (2014). Privacy-enhancing security protocol in LTE initial attack. Symmetry, 6(4), 1011–1025. https://doi.org/10.3390/sym6041011
Urien, P., Badra, M., & Dandjinou, M. (2004). EAP-TLS smartcards, from dream to reality. In 4th workshop on applications and services in wireless networks, ASWN, Boston University, Boston, August 8–11.
Li, X., Ma, J., Park, Y., & Xu, L. (2011). A USIM-based uniform access authentication framework in mobile communication. EURASIP Journal on Wireless Communications and Networking. https://doi.org/10.1155/2011/867315
Hajjaji El, Y., Idrissi, N. Z., & Jedra, M. (2014). A new authentication method for vertical and horizontal handover in 3G-WLAN interworking architecture. Research Journal of Applied Sciences, Engineering and Technology, 7(2), 329–342.
Kwon, J. O., Jeong, I. R., Sakurai, K., & Lee, D. H. (2007). Efficient verifier-based password-authenticated key exchange in the three-party setting. Computer Standards & Interfaces, 29(5), 513–520.
Kumar, A., & Om, H. (2018). Handover authentication scheme for device-to-device outband communication in 5g-wlan next generation heterogeneous networks. Arabian Journal for Science and Engineering, 43, 7961–7977. https://doi.org/10.1007/s13369-018-3255-6
Cao, J., Ma, M., Li, H., Fu, Y., & Liu, X. (2018). EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks. Journal of Network and Computer Applications, 102, 1–16. https://doi.org/10.1016/j.jnca.2017.11.009
You, I., & Lee, J.-H. (2017). SPFP-ticket-based secure handover for fast proxy mobile IPv6 in 5G networks. Computer Networks, 129, 363–372.
Funding
This research received no specific grant from any funding agency.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary Information
Below is the link to the electronic supplementary material.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Narmadha, R., Anitha, U. Authentication Analysis in HETNETS: Interworking Performance. Wireless Pers Commun 129, 1229–1248 (2023). https://doi.org/10.1007/s11277-023-10186-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10186-w