Abstract
This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes require the SN to interact with the HN for authenticating respective MSs, at the cost of repeated message exchanges and communication delay. Instead, in our design, when the first MS of a group visits, the SN performs full authentication with the concerned HN and thereby obtains authentication information for the MS and other members. Thus when any other MS of the same group visits, the SN can authenticate locally without subsequent involvement of the HN, so as to simplify protocol operations. We will show that our scheme does not trade performance for security and robustness to the extent that security requirements are unduly weakened. Both qualitative and quantitative discussions indicate that our proposed scheme lends itself to pragmatic settings.
Similar content being viewed by others
References
3rd Generation Partnership Project. (2001). Security architecture, 3GPP TS 21.133.
IEEE 802.16-2004. (2004). IEEE standard for local and metropolitan area networks part 16: Air interface for fixed broadband wireless access systems.
Arkko, J., & Haverinen, H. (2006). Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA). (RFC 4187). IETF Network Working Group.
Bargh, M. S., Hulsebosch, R. J., Eertink, E. H., Laganier, J., Zugenmaier, A., & Prasad, A. R. (2007). UMTS-AKA and EAP-AKA inter-working for fast handovers in all-IP networks. In IEEE Globecom (pp. 1–6).
Glass, S., Hiller, T., Jacobs, S., & Perkins, C. (2000). Mobile IP authentication, authorization, and accounting requirements. (RFC 2977). IETF Network Working Group.
Haverinen, H., & Salowey, J. (2006). Extensible authentication protocol method for global system for mobile communications (GSM) subscriber identity modules (EAP-SIM). (RFC 4186). IETF Network Working Group.
Huang, C. M., & Li, J. W. (2005). Authentication and key agreement protocol for UMTS with low bandwidth consumption. In Proceedings of 19th IEEE international conference on advanced information networking and applications (AINA) (pp. 392–397).
Kasera S., Narang N. (2005) 3G mobile networks: Architecture, protocols, and procedures. McGraw-Hill, New Delhi
Mitchell C. J. (2003) Security for mobility. Institution of Electrical Engineers, London, IN
Niemi V., Nyberg K. (2004) UMTS Security. Wiely, Chichester
Ou, H.-H., Hwang, M.-S., & Jan, J.-K. The UMTS-AKA protocols for intelligent transportation systems. EURASIP Journal on Wireless Communications and Networking, http://www.hindawi.com/journals/wcn/aip.267283.pdf.
TETRA Association. http://www.tetramou.com/.
Raya, M., & Hubaux, J. P. (2005). The security of VANETs. In Proceedings of the 2nd ACM international workshop on vehicular Ad Hoc networks (pp. 93–94).
Simpson, W. (1996). PPP challenge handshake authentication protocol (CHAP). (RFC 1994). IETF Network Working Group.
Tan, C. H., & Teo, J. C. M. (2005). An authenticated group key agreement for wireless networks. In Proceedings of the IEEE wireless communication and networking conference (WCNC).
Wallner, D., Harder, F., & Agee, R. (1999). Key management for multicast: Issues and architectures. (RFC 2626). IETF Network Working Group.
Wong C. K., Gouda M., Lam S. S. (2000) Secure group communications using key graph. IEEE/ACM Transactions on Networking 8(1): 78–85
Author information
Authors and Affiliations
Corresponding author
Additional information
This work has been supported by the National Science Council, ROC, under grants NSC 98-2220-E-009-047 and NSC 97-2221-E-009-051-MY3, and by the ministry of Economics, ROC, under the grant 9301 × S2210.
Rights and permissions
About this article
Cite this article
Chen, YW., Wang, JT., Chi, KH. et al. Group-Based Authentication and Key Agreement. Wireless Pers Commun 62, 965–979 (2012). https://doi.org/10.1007/s11277-010-0104-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-010-0104-7