A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks

  • Fang-Yie Leu
  • Yi-Fu Ciou
  • Yi-Li Huang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6908)

Abstract

In this paper, we propose a handover authentication mechanism, called handover key management and authentication scheme (HaKMA), which as a three-layer authentication architecture is a new version of our previous work Diffie-Hellman-PKDS-based authentication method (DiHam for short) by improving its key generation flow and adding a handover authentication scheme to respectively speed up handover process and increase the security level for mobile stations (MS). AAA server supported authentication is also enhanced by involving an improved extensible authentication protocol (EAP). According to the analyses of this study, the HaKMA is more secure than the compared schemes, including the PKMv2 and DiHam.

Keywords

HaKMA DiHam PKM WiMax IEEE802.16 Wireless security 

References

  1. 1.
    Johnston, D., Walker, J.: Overview of IEEE 802.16 security. IEEE Security & Privacy 2, 40–48 (2004)CrossRefGoogle Scholar
  2. 2.
    WiMAX Forum Network Architecture. Stage 2: Architecture Tenets, Reference Model and Reference Points - Part 2, pp. 167. WiMAX Forum (2009)Google Scholar
  3. 3.
    Leu, F.Y., Huang, Y.F., Chiu, C.H.: Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS. In: Conference Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS, pp. 391–397 (2010)Google Scholar
  4. 4.
    Ergen, M.: Mobile broadband including WiMAX and LTE. Springer Science+Business Media, LLC, Boston (2009)Google Scholar
  5. 5.
    Bernardos, C.J., Gramaglia, M., Contreras, L.M., Calderon, M., Soto, I.: Network-based Localized IP mobility Management: Proxy Mobile IPv6 and Current Trends in Standardization. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 1, 16–35 (2010)Google Scholar
  6. 6.
    Yan, Z., Zhou, H., You, I.: N-NEMO: A Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 1, 52–70 (2010)Google Scholar
  7. 7.
    Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). RFC. Internet Engineering Task Force: Network Working Group (2006)Google Scholar
  8. 8.
    Elgamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE T. Inform Theory 31, 469–472 (1985)MathSciNetMATHCrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Fang-Yie Leu
    • 1
  • Yi-Fu Ciou
    • 1
  • Yi-Li Huang
    • 1
  1. 1.Department of Computer ScienceTunghai UniversityTaiwan

Personalised recommendations