Advertisement

Authentication Protocol with Privacy Preservation for Handover in Wireless Mesh Networks

  • Amit Kumar RoyEmail author
  • Ajoy Kumar Khan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1045)

Abstract

As we know that accessing the Internet through a mobile device is growing rapidly worldwide. Therefore, a reliable and efficient authentication scheme for fast handover is essential to avoid temporary disconnection, authentication delay and non-registered access to the Internet. The handover took place when mobile device left its home mesh access point (HMAP) that covers a limited area within which it can get access to the Internet and joins the new MAP. To allow Internet access to the mobile device, mutual authentication took place between the mesh access point (MAP) and a client/user. Therefore, we proposed an efficient handoff authentication protocol along with preserving the privacy of the transfer ticket between clients and MAPs which is not considered in the existing method. The experiment result proves that our protocol achieves efficient handoff authentication with the privacy of the transfer ticket.

Keywords

Wireless mesh networks Login authentication Handover authentication Tickets Security requirements 

References

  1. 1.
    Fu, Y., He, J., Wang, R., Li, G.: Mutual authentication in wireless mesh networks. In: 2008 IEEE International Conference on Communications, pp. 1690–1694. IEEE, Beijing, China (2008)Google Scholar
  2. 2.
    Akyildiz, I.F., Wang, X.: A survey on wireless mesh networks. IEEE Commun. Mag. 43(9), S23–S30 (2005)CrossRefGoogle Scholar
  3. 3.
    Seyedzadegan, M., Othman, M., Ali, B.M., Subramaniam, S.: Wireless mesh networks: WMN overview, WMN architecture. In: International Conference on Communication Engineering and Networks IPCSIT 19, p. 2. Singapore (2011)Google Scholar
  4. 4.
    He, D., Chan, S., Guizani, M.: Handover authentication for mobile networks: Security and efficiency aspects. IEEE Network 29(3), 96–103 (2015)CrossRefGoogle Scholar
  5. 5.
    Jing, Q., Zhang, Y., Fu, A., Liu, X.: A privacy preserving handover authentication scheme for EAP-based wireless networks. In: Global Telecommunications Conference (GLOBECOM 2011), pp. 1–6. IEEE, New York, USA (2011)Google Scholar
  6. 6.
    Tie, L., Yi, Y.: Extended security analysis of multi-hop ticket based handover authentication protocol in the 802.16 j network. In: 8th International Conference on IEEE Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 1–10. Shanghai, China (2012)Google Scholar
  7. 7.
    Yang, X., Huang, X., Han, J., Su, C.: Improved handover authentication and key pre-distribution for wireless mesh networks. Concurrency Comput.: Pract. Exp. 28(10), 2978–2990 (2016)CrossRefGoogle Scholar
  8. 8.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(2), 228–258 (2005)CrossRefGoogle Scholar
  9. 9.
    Fu, A., Zhang, Y., Zhu, Z., Liu, X.: A fast handover authentication mechanism based on ticket for IEEE 802.16m. IEEE Commun. Lett. 14(12), 1134–1136 (2010)Google Scholar
  10. 10.
    Kohl, J., Neuman, C.: The Kerberos network authentication service (V5). No. RFC 1510 (1993)Google Scholar
  11. 11.
    Li, G., Chen, X., Ma, J.: A ticket-based re-authentication scheme for fast handover in wireless local area networks. In: 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1–4. IEEE, Chengdu, China (2010)Google Scholar
  12. 12.
    Li, G., Ma, J., Jiang, Q., Chen, X.: A novel re-authentication scheme based on tickets in wireless local area networks. J. Parallel Distrib. Comput. 71(7), 906–914 (2011)CrossRefGoogle Scholar
  13. 13.
    Blom, R.: An optimal class of symmetric key generation systems. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 335–338. Springer, Berlin, Heidelberg (1984)Google Scholar
  14. 14.
    Khedr, W.I., Abdalla, M.I., Elsheikh, A.A.: Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network. IET Inf. Secur. 9(6), 334–343 (2015)Google Scholar
  15. 15.
    Chaudhry, S.A., Farash, M.S., Naqvi, H., Islam, S.H., Shon, T.: A robust and efficient privacy aware handover authentication scheme for wireless networks. Wireless Pers. Commun. 93(2), 311–335 (2017)CrossRefGoogle Scholar
  16. 16.
    Wang, K., Wang, Y., Zeng, D., Guo, S.: An SDN-based architecture for next-generation wireless networks. IEEE Wirel. Commun. 24(1), 25–31 (2017)CrossRefGoogle Scholar
  17. 17.
    Srivatsa, A.M., Xie, J.: A performance study of mobile handoff delay in IEEE 802.11-based wireless mesh networks. In: 2008 IEEE International Conference on Communications, pp. 2485–2489. IEEE, Beijing, China (2008)Google Scholar
  18. 18.
    Li, C., Nguyen, U.T., Nguyen, H.L., Huda, N.: Efficient authentication for fast handover in wireless mesh networks. Comput. Secur. 37, 124–142 (2013)Google Scholar
  19. 19.
    Xu, L., He, Y., Chen, X., Huang, X.: Ticket-based handoff authentication for wireless mesh networks. Comput. Netw. 73, 185–194 (2014)CrossRefGoogle Scholar
  20. 20.
    Pirzada, A.A., McDonald, C.: Kerberos assisted authentication in mobile ad-hoc networks. In: Proceedings of the 27th Australasian conference on Computer science, vol. 26, pp. 41–46. Australian Computer Society, Dunedin, New Zealand (2004)Google Scholar
  21. 21.
    Kassab, M., Bonnin, J.M., Guillouard, K.: Securing fast handover in WLANs: A ticket based proactive authentication scheme. In: Globecom Workshops, pp. 1–6. IEEE, New York (2007)Google Scholar
  22. 22.
    Qazi, S., Mu, Y., Susilo, W.: Securing wireless mesh networks with ticket-based authentication. In: 2008 2nd International Conference on Signal Processing and Communication Systems, pp. 1–10. IEEE, Australia (2008)Google Scholar
  23. 23.
    Fu, A., Zhang, G., Zhang, Y., Zhu, Z.: GHAP: An efficient group-based handover authentication mechanism for IEEE 802.16m networks. Wireless Pers. Commun. 70(4), 1793–1810 (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Assam UniversitySilcharIndia

Personalised recommendations