Skip to main content
Log in

An efficient and secure authentication for inter-roaming in wireless heterogeneous network

  • Original Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

There has been a tremendous growth in wireless communications in the recent years. It allows a user to access telecommunication services at any wireless terminal based on unique user identity and security information. To enable users to utilize the services of various providers for such multimedia services, some kind of interaction is required between foreign provider and home provider of users. These inter-domain exchanges are subject to degradations such as packet loss and network delays, which increase the overall authentication time. In this paper, we develop an efficient and secure automated key management scheme that can securely inter-work among all types of mobile networks. The proposed protocol performs well in terms of computational and communication cost, and synchronization efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Arkko J, Haverinen H (2006) Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA), 2006 RFC 4187

  • Cappiello M, Floris A, Veltri L (2002) Mobility amongst heterogeneous networks with AAA support. In: Proceedings of IEEE ICC’02, vol. 4, Apr. 28–May 2, pp. 2064–2069

  • Dutta A et al (2007a) A framework of media-independent pre authentication (MPA) for inter-domain handover optimization. draft-ohba-moboptsmpa-framework-05, July 2007

  • Dutta A et al (2007b) Media-independent pre-authentication (MPA) implementation results. draft-ohba-mobopts-mpa implementation-04, July 2007

  • DSTC (2000) Public Key Infrastructure RFP. ftp://omg.org/pub/docs/ec/99-12-03.pdf

  • GPP (2004) Wireless Local Area Network (WLAN) Interworking Security, 2004 3GPP TS 33.234

  • Hartman S, Zhu L (2011) A generalized framework for Kerberos pre-authentication. IETF RFC 6113

  • Hodges J, Howlett J, Johansson L, Morgan RL (2008) Towards Kerberizing web identity and services, December 2008 8 Kerberos consortium

  • Hoeper K, Chen L (2007) Where EAP Security Claims Fail. Qshine 2007, The 4th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, August 14–17, 2007, Vancouver, Canada

  • Jacobs S Mobile IP public key based authentication. Available from: < draft-jacobs-mobileip-pki-auth-02.txt>

  • Johnson D, Perkins C, Arkko J (2003) Mobility Support in IPv6, draft-ietfmobileip-ipv6-24.txt

  • Kwon TT, Gerla M, Das S (2002) Mobility management for VOIP service: Mobile IP vs. SIP, IEEE Wireless Commun. Magazine 66–75

  • Mahshid M.-K, Eslamipoor R (2014) An optimized authentication protocol for mobile networks. Neural Comput Appl 25:379–385

  • Marin R, Bournelle J, Maknavicius-Laurent M, Combes JM, Gomez-Skarmeta A (2006) Improved EAP keying framework for a secure mobility access service, in: Proceedings of International Wireless Communications & Mobile Computing Conference 2006, IWCMC 2006, Vancouver, British Columbia, Canada, 2006, pp 183–188

  • Narayanan V, Clancy T, Nakhjiri M, Dondeti L (2008) Handover key management and re-authentication problem statement. RFC 5169

  • Neuman C, Yu T, Hartman S, Raeburn K The Kerberos Network Authentication Service (V5), July 2005 8 IETF RFC 4120

  • Perkins C, IP mobility support, RFC 2002 IETF, October 1996

  • Perkins C (1999) Mobile IP and security issue: an overview. In: Proceedings. First IEEE/Popov Workshop on Internet Technologies and Services. pp. 131–148

  • Rafa ML, Fernando PG, Yoshihiro O, Fernando BH, Antonio FG (2010) A kerberized architecture for fast re-authentication in heterogeneous wireless networks. Mob Netw Appl 15(3):392e412

    Google Scholar 

  • Tsai YR, Chang CJ (2006) SIM-based subscriber authentication mechanism for wireless local area networks. Comput Commun 29(10):1744–1753

    Article  Google Scholar 

  • Tsai H-C, Chang C-C, Chang K-J (2009) Roaming across wireless local area networks using SIM-based authentication protocol. Comput Stand Interfaces 31:381–389

    Article  Google Scholar 

  • Valko AG, Campell AT, Gomez J (1998) Cellular IP. Internet Draft, draft-valko-cellularip-00.txt

  • Valko AG (1999) Cellular IP-A new approach to internet host mobility. ACM Computer Communication Review

  • Xie B, Kumar A, Cavalcanti D, Agrawal DP, Srinivasan S (2005) Mobility and routing management for heterogeneous multi-hop wireless networks. In: Proceeding of IEEE International Workshop on Heterogeneous Multi-Hop Wireless and Mobile Networks, November 2005

  • Zhang M, Fang Y (2005) Security analysis and enhancement of 3GPP authentication and key agreement protocol. IEEE Trans Wireless Commun 4(2):734_742

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reza Eslamipoor.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mahshid, MK., Eslamipoor, R. An efficient and secure authentication for inter-roaming in wireless heterogeneous network. Soc. Netw. Anal. Min. 4, 222 (2014). https://doi.org/10.1007/s13278-014-0222-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13278-014-0222-4

Keywords

Navigation