Real-Time Inter-domain Handover Re-authentication Protocol

  • Radu Lupu
  • Eugen Borcoci
  • Dan Galatchi
  • Tinku Rasheed
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 66)

Abstract

Several statistics achieved to date on the Internet attacks have shown that one of the major causes for their proliferation is the scarce deployment of entity authentication mechanisms. Providing seamless support for real-time applications during the inter-domain handover procedure is one of the issues that still hinder the adoption of the network entity authentication service. In this paper, we focus on the design of a novel handover re-authentication protocol that can allow overcoming the current state. Furthermore, we also define the overall requirements for the underlying class of cryptographic methods which shall be used to implement our protocol. Thereafter, we present the preliminary results that were achieved on the re-authentication protocol validation.

Keywords

Authentication real-time handover wireless networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wendt, S., Kharrat-Kammoun, F., Borcoci, E., Cacoveanu, R., Lupu, R., Hayes, D.: Network architecture and system specification, SMART-Net project IST-FP7 223937 (October 2009)Google Scholar
  2. 2.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (October 1996)Google Scholar
  3. 3.
    Dolev, D., Yao, A.: On the security of Public-Key Protocols. IEEE Transactions on Information Theory 2(29) (1983)Google Scholar
  4. 4.
    Calhoun, P., Montemurro, M., Stanley, D.: Control and Provisioning of Wireless Access Points (CAPWAP) Protocol Specification, IETF, RFC 5415 (March 2009)Google Scholar
  5. 5.
    Komarova, M.: Fast authentication and trust based access control in heterogeneous wireless networks, Ph.D. Thesis (May 2008)Google Scholar
  6. 6.
    Mishra, A., Shin, M., Arbaugh, W.: An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff ProcessGoogle Scholar
  7. 7.
    Clancy, T., Nakhjiri, M., Narayanan, V., Dondeti, L.: Handover Key Management and Re-Authentication Problem Statement, IETF, RFC 5169 (March 2008), www.ietf.org
  8. 8.
    Narayanan, V., Dondeti, L.: EAP Extensions for EAP Re-authentication Protocol (ERP), IETF, RFC 5296 (August 2008), www.ietf.org
  9. 9.
    Hoeper, K., Ohba, Y.: Distribution of EAP based keys for handover and re-authentication, IETF, draft-ietf-hokey-key-mgm-06 (April 2009), www.ietf.org
  10. 10.
    Clancy, T.: Secure Handover in Enterprise WLANs: CAPWAP, HOKEY and 802.11rGoogle Scholar
  11. 11.
    Huang, P.J., Tseng, Y.C.: A Fast Handoff Mechanism for IEEE 802.11 and IAPP NetworksGoogle Scholar
  12. 12.
    Chen, J.J., Tseng, Y.C., Lee, H.W.: A Seamless Handoff Mechanism for IEEE 802.11 WLANs Supporting IEEE 802.11i Security EnhancementsGoogle Scholar
  13. 13.
    Bournelle, J., Laurent-Maknavicius, M., El Mghazli, Y., Giaretta, G., Lopez, R., Ohba, Y.: Use of Context Transfer Protocol (CXTP) for PANA, draft-ietf-pana-cxtp-01 (March 2006), www.ietf.org
  14. 14.
    Ohba, Y.: Pre-authentication support for PANA, draft-ietf-pana-preauth-06 (June 2009), www.ietf.org
  15. 15.
    Forsberg, D., Ohba, Y., Tschofenig, B., Yegin, A.: Protocol for carrying authentication for network access (PANA), RFC 5191 (May 2008), www.ietf.org
  16. 16.
    Lupu, R., Borcoci, E., Mirzadeh, S., Hamadani, E., Rasheed, T.: D3.5a: Security and Privacy Requirements, SMART-Net project IST 223937 (April 2009)Google Scholar
  17. 17.
    Farell, S., Volbrecht, J., Calhoun, P.: AAA Authorization Requirements, RFC 2906, IETF (August 2000)Google Scholar
  18. 18.
    Aboba, B., Beadles, M.: The network identifier, RFC 2486, IETF (January 1999)Google Scholar
  19. 19.
    Vollbrecht, J., Calhoun, P., Farell, S., et al.: AAA Authorization Framework, RFC 2904, IETF (August 2000)Google Scholar
  20. 20.
    Lupu, R., Stanciu, M.: Authentication and authorization architecture for hybrid mesh networks. In: Conf. Int. Communications 2010 (Iunie 2010)Google Scholar
  21. 21.
    Long, M., Wu, C-H., David Irwin, J.: Localized Authentication for Wireless LAN Inter-network RoamingGoogle Scholar
  22. 22.
    Lin, X., Ling, X., Zhu, H., Ho, P.H., Shen, X.: A novel localised authentication scheme in IEEE 802.11 based wireless mesh network. Intl. Journal Security and Networks 3(2) (2008)Google Scholar
  23. 23.
    Hong, Z., Rui, H., Man, Y.: A novel fast authentication method for mobile network access (2004)Google Scholar
  24. 24.
  25. 25.
    IEEE-SA Standards Board, Port-based Network Access Control, IEEE Std. 802.1x-2001 (October 2001) ISBN 0-7381-2626-7Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  • Radu Lupu
    • 1
  • Eugen Borcoci
    • 1
  • Dan Galatchi
    • 1
  • Tinku Rasheed
    • 2
  1. 1.University Politehnica of BucharestBucharestRomania
  2. 2.CREATE-NETPovoItaly

Personalised recommendations