Abstract
Generally, the re-authentication procedure in a visited network causes a large delay during a secure handover that always involves communication with the home network. Most existing solutions are based on pre-authentication between the different domains, which needs to statically build the roaming agreement between each pair of domains, and cannot support dynamic and flexible cooperation for them. In this paper, we propose a fast re-authentication scheme, based on an authentication token mechanism to reduce the secure handover delay. The authentication token is issued by the home authentication server. The proposed protocol eliminates the need for communication between the target and the user’s home networks for credentials verification. Numerical results obtained from a series of simulations show that the proposed scheme enhances handover parameters such as authentication latency and handover blocking probability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Obaidat, M.S., Boudriga, N.: Security of e-Systems and Computer Networks. Cambridge University Press, Cambridge (2007)
Kwon, H., Cheon, K., Roh, K., Park A.: USIM based authentication test-bed For UMTS-WLAN handover. IEEE International Conference on Computer Communications, Barcelona, Spain, Apr 2006
Tseng Y-M.: USIM-based EAP-TLS authentication protocol for wireless local area networks. Comput. Stand. Interfaces 31(1), (2009)
Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). IETF, RFC 4187, Jan 2006
Ntantogian, C., Xenakis, C.: One-Pass EAPAKA authentication in 3G-WLAN integrated networks. Wireless Pers. Commun. 48(4), 569–584 (2009). Springer
Mun, H., Han, K., Kim K.: 3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA. International Symposium on Taiwan, April 2009
Daly, I., Zarai, F., Kamoun L.: Re-authentication protocol for vertical handoff in heterogeneous wireless networks. In: 3rd International Conference on Mobile Lightweight Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 81. Part 4, pp 219–230, (2012)
Kwon, H., Ro, K., Park, A.: UMTS-WLAN interworking strategies for reducing handover delays. In: IEEE 64th Vehicular Technology Conference (VTC-2006), pp. 1–5, Sept 2006
Lim, S.-H., Bang, K.-S., Yi, O., Lim, J.: A secure handover protocol design in wireless networks with formal verification. Lecture Notes in Computer Science, vol. 4517. pp. 67–78, Springer, Berlin (2007)
Huang, S., Zhu, H., Zhang, W.: SAP: Seamless Authentication Protocol for Vertical handoff in Heterogeneous Wireless Networks. QShine 2006, Canada (2006)
Lee, M., Kim, G., Park, S.: Seamless and secure mobility management with location-aware service (LAS) broker for future Mobile Interworking networks. J. Commun. Netw. 7(2), 207–221 (2005)
El Bouabidi, I., Daly, I., Zarai, F.: Secure handoff protocol in 3GPP LTE networks. In: 3rd International Conference on Communications and Networking, Tunisia, 29 March–01 April 2012
Zhang, M., Fang, Y.: Security analysis and enhancements of 3GPP AKA protocol. IEEE Trans. Wireless Commun. 4(2), 734–742 (2005)
Daly, I., Zarai F., Kamoun, L.: Design and implementation of a simulation environment for the evaluation of authentication protocols in IEEE 802.11s networks. In: 3rd International ICST Conference on Mobile Lightweight Wireless Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 81. Part 4, pp. 206–218, (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
El Bouabidi, I., Zarai, F., Obaidat, M.S., Kamoun, L. (2013). Fast and Secure Handover into Visited WLAN Networks. In: Han, YH., Park, DS., Jia, W., Yeo, SS. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 214. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5857-5_70
Download citation
DOI: https://doi.org/10.1007/978-94-007-5857-5_70
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5856-8
Online ISBN: 978-94-007-5857-5
eBook Packages: EngineeringEngineering (R0)