Skip to main content
Log in

Group-Based Authentication and Key Agreement

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes require the SN to interact with the HN for authenticating respective MSs, at the cost of repeated message exchanges and communication delay. Instead, in our design, when the first MS of a group visits, the SN performs full authentication with the concerned HN and thereby obtains authentication information for the MS and other members. Thus when any other MS of the same group visits, the SN can authenticate locally without subsequent involvement of the HN, so as to simplify protocol operations. We will show that our scheme does not trade performance for security and robustness to the extent that security requirements are unduly weakened. Both qualitative and quantitative discussions indicate that our proposed scheme lends itself to pragmatic settings.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. 3rd Generation Partnership Project. (2001). Security architecture, 3GPP TS 21.133.

  2. IEEE 802.16-2004. (2004). IEEE standard for local and metropolitan area networks part 16: Air interface for fixed broadband wireless access systems.

  3. Arkko, J., & Haverinen, H. (2006). Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA). (RFC 4187). IETF Network Working Group.

  4. Bargh, M. S., Hulsebosch, R. J., Eertink, E. H., Laganier, J., Zugenmaier, A., & Prasad, A. R. (2007). UMTS-AKA and EAP-AKA inter-working for fast handovers in all-IP networks. In IEEE Globecom (pp. 1–6).

  5. Glass, S., Hiller, T., Jacobs, S., & Perkins, C. (2000). Mobile IP authentication, authorization, and accounting requirements. (RFC 2977). IETF Network Working Group.

  6. Haverinen, H., & Salowey, J. (2006). Extensible authentication protocol method for global system for mobile communications (GSM) subscriber identity modules (EAP-SIM). (RFC 4186). IETF Network Working Group.

  7. Huang, C. M., & Li, J. W. (2005). Authentication and key agreement protocol for UMTS with low bandwidth consumption. In Proceedings of 19th IEEE international conference on advanced information networking and applications (AINA) (pp. 392–397).

  8. Kasera S., Narang N. (2005) 3G mobile networks: Architecture, protocols, and procedures. McGraw-Hill, New Delhi

    Google Scholar 

  9. Mitchell C. J. (2003) Security for mobility. Institution of Electrical Engineers, London, IN

    Google Scholar 

  10. Niemi V., Nyberg K. (2004) UMTS Security. Wiely, Chichester

    Google Scholar 

  11. Ou, H.-H., Hwang, M.-S., & Jan, J.-K. The UMTS-AKA protocols for intelligent transportation systems. EURASIP Journal on Wireless Communications and Networking, http://www.hindawi.com/journals/wcn/aip.267283.pdf.

  12. TETRA Association. http://www.tetramou.com/.

  13. Raya, M., & Hubaux, J. P. (2005). The security of VANETs. In Proceedings of the 2nd ACM international workshop on vehicular Ad Hoc networks (pp. 93–94).

  14. Simpson, W. (1996). PPP challenge handshake authentication protocol (CHAP). (RFC 1994). IETF Network Working Group.

  15. Tan, C. H., & Teo, J. C. M. (2005). An authenticated group key agreement for wireless networks. In Proceedings of the IEEE wireless communication and networking conference (WCNC).

  16. Wallner, D., Harder, F., & Agee, R. (1999). Key management for multicast: Issues and architectures. (RFC 2626). IETF Network Working Group.

  17. Wong C. K., Gouda M., Lam S. S. (2000) Secure group communications using key graph. IEEE/ACM Transactions on Networking 8(1): 78–85

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chien-Chao Tseng.

Additional information

This work has been supported by the National Science Council, ROC, under grants NSC 98-2220-E-009-047 and NSC 97-2221-E-009-051-MY3, and by the ministry of Economics, ROC, under the grant 9301 × S2210.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, YW., Wang, JT., Chi, KH. et al. Group-Based Authentication and Key Agreement. Wireless Pers Commun 62, 965–979 (2012). https://doi.org/10.1007/s11277-010-0104-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-010-0104-7

Keywords

Navigation