Skip to main content

Fast and Secure Handover into Visited WLAN Networks

  • Conference paper
  • First Online:
Ubiquitous Information Technologies and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 214))

Abstract

Generally, the re-authentication procedure in a visited network causes a large delay during a secure handover that always involves communication with the home network. Most existing solutions are based on pre-authentication between the different domains, which needs to statically build the roaming agreement between each pair of domains, and cannot support dynamic and flexible cooperation for them. In this paper, we propose a fast re-authentication scheme, based on an authentication token mechanism to reduce the secure handover delay. The authentication token is issued by the home authentication server. The proposed protocol eliminates the need for communication between the target and the user’s home networks for credentials verification. Numerical results obtained from a series of simulations show that the proposed scheme enhances handover parameters such as authentication latency and handover blocking probability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Obaidat, M.S., Boudriga, N.: Security of e-Systems and Computer Networks. Cambridge University Press, Cambridge (2007)

    Book  Google Scholar 

  2. Kwon, H., Cheon, K., Roh, K., Park A.: USIM based authentication test-bed For UMTS-WLAN handover. IEEE International Conference on Computer Communications, Barcelona, Spain, Apr 2006

    Google Scholar 

  3. Tseng Y-M.: USIM-based EAP-TLS authentication protocol for wireless local area networks. Comput. Stand. Interfaces 31(1), (2009)

    Google Scholar 

  4. Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). IETF, RFC 4187, Jan 2006

    Google Scholar 

  5. Ntantogian, C., Xenakis, C.: One-Pass EAPAKA authentication in 3G-WLAN integrated networks. Wireless Pers. Commun. 48(4), 569–584 (2009). Springer

    Article  Google Scholar 

  6. Mun, H., Han, K., Kim K.: 3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA. International Symposium on Taiwan, April 2009

    Google Scholar 

  7. Daly, I., Zarai, F., Kamoun L.: Re-authentication protocol for vertical handoff in heterogeneous wireless networks. In: 3rd International Conference on Mobile Lightweight Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 81. Part 4, pp 219–230, (2012)

    Google Scholar 

  8. Kwon, H., Ro, K., Park, A.: UMTS-WLAN interworking strategies for reducing handover delays. In: IEEE 64th Vehicular Technology Conference (VTC-2006), pp. 1–5, Sept 2006

    Google Scholar 

  9. Lim, S.-H., Bang, K.-S., Yi, O., Lim, J.: A secure handover protocol design in wireless networks with formal verification. Lecture Notes in Computer Science, vol. 4517. pp. 67–78, Springer, Berlin (2007)

    Google Scholar 

  10. Huang, S., Zhu, H., Zhang, W.: SAP: Seamless Authentication Protocol for Vertical handoff in Heterogeneous Wireless Networks. QShine 2006, Canada (2006)

    Google Scholar 

  11. Lee, M., Kim, G., Park, S.: Seamless and secure mobility management with location-aware service (LAS) broker for future Mobile Interworking networks. J. Commun. Netw. 7(2), 207–221 (2005)

    Google Scholar 

  12. El Bouabidi, I., Daly, I., Zarai, F.: Secure handoff protocol in 3GPP LTE networks. In: 3rd International Conference on Communications and Networking, Tunisia, 29 March–01 April 2012

    Google Scholar 

  13. Zhang, M., Fang, Y.: Security analysis and enhancements of 3GPP AKA protocol. IEEE Trans. Wireless Commun. 4(2), 734–742 (2005)

    Article  Google Scholar 

  14. Daly, I., Zarai F., Kamoun, L.: Design and implementation of a simulation environment for the evaluation of authentication protocols in IEEE 802.11s networks. In: 3rd International ICST Conference on Mobile Lightweight Wireless Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 81. Part 4, pp. 206–218, (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Faouzi Zarai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

El Bouabidi, I., Zarai, F., Obaidat, M.S., Kamoun, L. (2013). Fast and Secure Handover into Visited WLAN Networks. In: Han, YH., Park, DS., Jia, W., Yeo, SS. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 214. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5857-5_70

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5857-5_70

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5856-8

  • Online ISBN: 978-94-007-5857-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics