Skip to main content
Log in

Authentication Analysis in HETNETS: Interworking Performance

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In heterogeneous networks, mobile nodes face long authentication delays, affecting the throughput and the duration for the entire authentication process increases considerably. The ultimate reduction in the processing time on authentication procedure is required for a smooth and seamless hand over. Authentication delay occurs because of key exchange between administrative domains. It is noticeable that as the number of mobile nodes requesting authentication increases, the operating cost of the authentication process also increases which turns into a big key challenging problem. The interoperability of dissimilar next generation networks will lead to better data rates, good spectrum efficiency and excellent serviceability to mobile users. Several factors cause decline in the quality of service and increase in handover delay. The proposed research work aims at developing an efficient authentication technique that improves the security of data transmission in heterogeneous network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Data Availability

The authors confirm that the data and material supporting the finding of this study are available within the article.

Code Availability

The codes that support the finding of this study are available from the corresponding author upon reasonable request.

References

  1. Shidhani, A. A., & Leung, V. C. M. (2008). Local fast re-authentication for 3G-WLAN interworking. Security and Communication Networks, 1(4), 309–323.

    Article  Google Scholar 

  2. Al Shidhani, A., & Leung, V. C. M. (2008). Reducing re-authentication delays during UMTS-WLAN vertical handovers. In 2008 IEEE 19th international symposium on personal, indoor and mobile radio communications (pp. 1–5). https://doi.org/10.1109/PIMRC.2008.4699796

  3. Huang, Y. H., & Chen, Y.-C. (2010). A cross-layer media-independent Handover scheme in heterogeneous WiMAX/WiFi networks. In Proceedings of the 8th International Network Conference, INC 2010 (pp. 121–130).

  4. Huang, Y.-L., Shen, C. Y., Shieh, S., Wang, H.-J., & Lin, C.-C. (2009). Provable secure AKA scheme with reliable key delegation in UMTS. In Third IEEE international conference on secure software integration and reliability improvement (pp. 243–252).

  5. Pontes, A., Silva, D., Jailton, J., Rodrigues, O., & Dias, K. (2008). Handover management in integrated WLAN and mobile WiMAX networks. IEEE Wireless Communications, 15(5), 86–95.

    Article  Google Scholar 

  6. Cao, L., Liu, Y., & Cao, S. (2019). An authentication protocol in LTE-WLAN heterogeneous converged network based on certificateless sign crypton scheme with identity privacy protection. IEEE Access, 7, 139001–139012.

    Article  Google Scholar 

  7. Shen, S.-S., Lin, S.-H., & Chiu, J.-H. (2014). Fast handover pre-authentication protocol in 3GPPWLAN heterogeneous mobile networks. International Journal on Communications, Network and System Sciences, 7(4), 101–113. https://doi.org/10.4236/ijcns.2014.74012

    Article  Google Scholar 

  8. Wang, S., Cao, Z., & Cao, F. (2008). Efficient identity-based authenticated key agreement protocol with PKG forward secrecy. International Journal of Network Security, 7(2), 181–186.

    Google Scholar 

  9. Arkko, J., & Haverinen, H. (2006). Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA). In IETF, RFC 4187.

  10. Rai, A. K., Mishra, S., & Kumar, V. (2010). Strong password based EAP-TLS authentication protocol for WiMAX. International Journal on Computer Science and Engineering, 2(8), 2736–2741.

    Google Scholar 

  11. Lai, C., Li, H., Lu, R., & Shen, X. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57, 3492–3510.

    Article  Google Scholar 

  12. Choi, D., Choi, H.-K., & Lee, S.-Y. (2015). A group-based security protocol for machine-type communications in LTE- advanced. Wireless Networks, 21(2), 405–419.

    Article  Google Scholar 

  13. Alezabi, K. A., Hashim, F., Hashim, S., & Ali, B. M. (2014). An efficient authentication and key agreement protocol for 4G (LTE) networks. In IEEE Region 10 Symposium (pp. 502–507). https://doi.org/10.1109/TENCONSpring.2014.6863085

  14. Mun, H., Han, K., & Kim, K. (2009). 3G-WLAN interworking: Security analysis and new authentication and key agreement based on EAP AKA. In Proceedings of WTS’09, Prague, Czech (pp. 1–8)

  15. Potlapally, N. R., Ravi, S., Raghunathan, A., & Jha, N. K. (2006). A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing, 5(2), 128–143.

    Article  Google Scholar 

  16. Qachri, N., Markowitch, O., & Dricot, J.-M. (2013). A formally verified protocol for secure vertical handovers in 4G heterogeneous networks. International Journal of Security and Its Applications, 7(6), 309–326. https://doi.org/10.14257/ijsia.2013.7.6.32

    Article  Google Scholar 

  17. Urien, P., & Dandjinou, M. (2006). Designing smartcards for emerging wireless networks. In Series lecture notes in smart card research and advanced applications (Vol. 3928, pp. 165–178)

  18. Hamada, R. A., Ali, H. S., & Abdalla, M. I. (2014). SIP-based mobility management for LTE-WiMAX-WLAN interworking using IMS architecture. International Journal of Computer Networks, 6(1), 1–14.

    Google Scholar 

  19. Lin, S.-H., Chiu, J.-H., & Shen, S.-S. (2011). A fast iterative localized re-authentication protocol for UMTS-WLAN heterogeneous mobile communication networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), 1.

    Article  Google Scholar 

  20. Simon, D., Aboba, B., & Hurst, R. (2008). The EAP-TLS authentication protocol. In RFC 5216.

  21. Jang, U., Lim, H., & Kim, H. (2014). Privacy-enhancing security protocol in LTE initial attack. Symmetry, 6(4), 1011–1025. https://doi.org/10.3390/sym6041011

    Article  Google Scholar 

  22. Urien, P., Badra, M., & Dandjinou, M. (2004). EAP-TLS smartcards, from dream to reality. In 4th workshop on applications and services in wireless networks, ASWN, Boston University, Boston, August 8–11.

  23. Li, X., Ma, J., Park, Y., & Xu, L. (2011). A USIM-based uniform access authentication framework in mobile communication. EURASIP Journal on Wireless Communications and Networking. https://doi.org/10.1155/2011/867315

    Article  Google Scholar 

  24. Hajjaji El, Y., Idrissi, N. Z., & Jedra, M. (2014). A new authentication method for vertical and horizontal handover in 3G-WLAN interworking architecture. Research Journal of Applied Sciences, Engineering and Technology, 7(2), 329–342.

    Article  Google Scholar 

  25. Kwon, J. O., Jeong, I. R., Sakurai, K., & Lee, D. H. (2007). Efficient verifier-based password-authenticated key exchange in the three-party setting. Computer Standards & Interfaces, 29(5), 513–520.

    Article  Google Scholar 

  26. Kumar, A., & Om, H. (2018). Handover authentication scheme for device-to-device outband communication in 5g-wlan next generation heterogeneous networks. Arabian Journal for Science and Engineering, 43, 7961–7977. https://doi.org/10.1007/s13369-018-3255-6

    Article  Google Scholar 

  27. Cao, J., Ma, M., Li, H., Fu, Y., & Liu, X. (2018). EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks. Journal of Network and Computer Applications, 102, 1–16. https://doi.org/10.1016/j.jnca.2017.11.009

    Article  Google Scholar 

  28. You, I., & Lee, J.-H. (2017). SPFP-ticket-based secure handover for fast proxy mobile IPv6 in 5G networks. Computer Networks, 129, 363–372.

    Article  Google Scholar 

Download references

Funding

This research received no specific grant from any funding agency.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Narmadha.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Below is the link to the electronic supplementary material.

Supplementary file1 (PDF 2480 kb)

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Narmadha, R., Anitha, U. Authentication Analysis in HETNETS: Interworking Performance. Wireless Pers Commun 129, 1229–1248 (2023). https://doi.org/10.1007/s11277-023-10186-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10186-w

Keywords

Navigation