Fast and Secure Handover into Visited WLAN Networks

  • Imen El Bouabidi
  • Faouzi Zarai
  • Mohammad S. Obaidat
  • Lotfi Kamoun
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 214)


Generally, the re-authentication procedure in a visited network causes a large delay during a secure handover that always involves communication with the home network. Most existing solutions are based on pre-authentication between the different domains, which needs to statically build the roaming agreement between each pair of domains, and cannot support dynamic and flexible cooperation for them. In this paper, we propose a fast re-authentication scheme, based on an authentication token mechanism to reduce the secure handover delay. The authentication token is issued by the home authentication server. The proposed protocol eliminates the need for communication between the target and the user’s home networks for credentials verification. Numerical results obtained from a series of simulations show that the proposed scheme enhances handover parameters such as authentication latency and handover blocking probability.


Handover 3GPP LTE WLANs Authentication Performance evaluation 


  1. 1.
    Obaidat, M.S., Boudriga, N.: Security of e-Systems and Computer Networks. Cambridge University Press, Cambridge (2007)CrossRefGoogle Scholar
  2. 2.
    Kwon, H., Cheon, K., Roh, K., Park A.: USIM based authentication test-bed For UMTS-WLAN handover. IEEE International Conference on Computer Communications, Barcelona, Spain, Apr 2006Google Scholar
  3. 3.
    Tseng Y-M.: USIM-based EAP-TLS authentication protocol for wireless local area networks. Comput. Stand. Interfaces 31(1), (2009)Google Scholar
  4. 4.
    Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). IETF, RFC 4187, Jan 2006Google Scholar
  5. 5.
    Ntantogian, C., Xenakis, C.: One-Pass EAPAKA authentication in 3G-WLAN integrated networks. Wireless Pers. Commun. 48(4), 569–584 (2009). SpringerCrossRefGoogle Scholar
  6. 6.
    Mun, H., Han, K., Kim K.: 3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA. International Symposium on Taiwan, April 2009Google Scholar
  7. 7.
    Daly, I., Zarai, F., Kamoun L.: Re-authentication protocol for vertical handoff in heterogeneous wireless networks. In: 3rd International Conference on Mobile Lightweight Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 81. Part 4, pp 219–230, (2012)Google Scholar
  8. 8.
    Kwon, H., Ro, K., Park, A.: UMTS-WLAN interworking strategies for reducing handover delays. In: IEEE 64th Vehicular Technology Conference (VTC-2006), pp. 1–5, Sept 2006Google Scholar
  9. 9.
    Lim, S.-H., Bang, K.-S., Yi, O., Lim, J.: A secure handover protocol design in wireless networks with formal verification. Lecture Notes in Computer Science, vol. 4517. pp. 67–78, Springer, Berlin (2007)Google Scholar
  10. 10.
    Huang, S., Zhu, H., Zhang, W.: SAP: Seamless Authentication Protocol for Vertical handoff in Heterogeneous Wireless Networks. QShine 2006, Canada (2006)Google Scholar
  11. 11.
    Lee, M., Kim, G., Park, S.: Seamless and secure mobility management with location-aware service (LAS) broker for future Mobile Interworking networks. J. Commun. Netw. 7(2), 207–221 (2005)Google Scholar
  12. 12.
    El Bouabidi, I., Daly, I., Zarai, F.: Secure handoff protocol in 3GPP LTE networks. In: 3rd International Conference on Communications and Networking, Tunisia, 29 March–01 April 2012Google Scholar
  13. 13.
    Zhang, M., Fang, Y.: Security analysis and enhancements of 3GPP AKA protocol. IEEE Trans. Wireless Commun. 4(2), 734–742 (2005)CrossRefGoogle Scholar
  14. 14.
    Daly, I., Zarai F., Kamoun, L.: Design and implementation of a simulation environment for the evaluation of authentication protocols in IEEE 802.11s networks. In: 3rd International ICST Conference on Mobile Lightweight Wireless Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 81. Part 4, pp. 206–218, (2012)Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  • Imen El Bouabidi
    • 1
  • Faouzi Zarai
    • 1
  • Mohammad S. Obaidat
    • 2
  • Lotfi Kamoun
    • 1
  1. 1.LETI laboratoryUniversity of SfaxSfaxTunisia
  2. 2.Computer Science and Software Engineering DepartmentUniversity of MonmouthMonmouthUSA

Personalised recommendations