Pre-Authentication Design for Seamless and Secure Handover in Mobile WiMAX
(*) Corresponding author
DOI: https://doi.org/10.15866/irecos.v10i7.6955
Abstract
Mobile WiMAX uses EAP-based authentication and key management for link layer security. One of the major challenges concerning the performance of mobile WiMAX is seamless handover. Research shows that a large portion of delay related to handover actually comes from user authentication and network entry and re-entry. In general, total delay associated with the handover process can be divided into three categories: i) link layer handover delay, ii) IP layer handover delay, and iii) security sub-layer handover delay. We propose a pre-authentication design that can provide seamless and safe connection when handover takes place. Our design is based on the least privilege principle; therefore, our approach guarantees backward/forward secrecy. We conduct research using an ns-2 simulation tool to measure the performance of our seamless handover. Our approach is validated using automated validation of Internet Security Protocols and Applications (AVISPA).
Copyright © 2015 Praise Worthy Prize - All rights reserved.
Keywords
Full Text:
PDFReferences
IEEE Std 802.16e-2005 and IEEE Std 802.16-2004/Cor1-2005, “Amendment2 for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands”, November 2005.
IEEE Std 802.16-2004, “Air Interface for Broadband Wireless Access Systems”, October 2004.
http://dx.doi.org/10.1109/ieeestd.2012.6272299
WiMAX Forum, “Mobile WiMAX - Part I: A Technical Overview and Performance Evaluation”, February 2006.
D.H. Lee, K. Kyamakya, and J. P. Umindi, “Fast Handover Algorithm for IEEE 802.16e Broadband Wireless Access System,” Proceedings of IEEE WPCC 2006, Jan. 2006, pp.1-6.
http://dx.doi.org/10.1109/iswpc.2006.1613600
L. S. Lee and K. Wang, “A Network Assisted Fast Handover Scheme for IEEE 802.16e Networks,” Proceedings of IEEE PIMRC 2007, Athens, Greece, Sept. 2007, pp.1-5.
Y. H. Han et al., “A Crossing-Layering Design for IPv6 Fast Handover Support in an IEEE 802.16e Wireless MAN,” IEEE Network, vol. 21, no. 6, Nov.-Dec. 2007, pp. 54-62.
http://dx.doi.org/10.1109/mnet.2007.4395111
H. J. Jang, J. H. Jee, Y. H. Han, S. D. Park, and J. S. Cha, “Mobile IPv6 Fast Handoffs over IEEE 802.16e Networks,” IETF draft, draft-ietf-mipshop-fh80216e-05.txt, Nov. 16, 2007.
L. Chen et al., “A Cross-Layer Fast Handover Scheme for Mobile WiMAX,” Proceedings of IEEE VTC 2007, Baltimore, MD, USA, Sept.-Oct. 2007, pp.1578-1582.
Y. W. Chen and F. Y. Hsieh, “A Cross Layer Design for Handoff in 802.16e Network with IPv6 Mobility,” Proceedings of IEEE WCNC 2007, Kowloon, Mar. 2007, pp.3844-3849.
C. K. Chang and C. T. Huang, “Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks,” Proceedings of ICPPW 2007, Xian, China, Sept. 2007, pp.46-46.
http://dx.doi.org/10.1109/icppw.2007.44
Elgembari, E.S., Seman, K.B., A study on the effect of different velocities on the handover delay in WiMAX systems, (2013) International Review on Computers and Software (IRECOS), 8 (1), pp. 115-119.
Wenhua Jiao, Pin Jiang, Yuanyuan Ma, "Fast Handover Scheme for Real-Time Applications in Mobile WiMAX" ICC '07. IEEE International Conference on Communications, June 2007.
http://dx.doi.org/10.1109/icc.2007.1000
H-M.Sun, S-Y.Chang, Y-H.Lin and S-Y.Chiou, Efficient Authentication Schemes for Handover in Mobile WiMAX,” Proc. of 8th Int’l Conf. on Syst. Design and Applications, 2008.
http://dx.doi.org/10.1109/isda.2008.330
Junbeom Hur, Hyeongseop Shim, Pyung Kim, Hyunsoo Yoon, Nah-Oak Song, "Security Considerations for Handover Schemes in Mobile WiMAX Networks," Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE, Las Vegas, USA, March 31 2008-April 3 2008, pp. 2531 – 2536.
http://dx.doi.org/10.1109/wcnc.2008.445
Hua Cai, et al., “Measurement-Based Low-Level Performance Analysis of IEEE 802.16e/WiBro Networks," Proc. International Conference on Information Networking, Busan, Korea, Jan. 27- 29, 2010.
H. F. Zmezm, S.J. Hashim, Aduwati Sali , “Fast and Secure Handover Authentication Scheme in Mobile WiMAX”, Journal of Theoretical and Applied Information Technology , Vol. 59 No.2 , pp. 520 – 525, January 2014.
Zmezm, H.F., Hashim, S.J., Sali, A., Alezabi, K.A., Seamless and secure design for subsequent handover in mobile WiMAX networks, (2014) International Review on Computers and Software (IRECOS), 9 (8), pp. 1399-1407.
http://dx.doi.org/10.15866/irecos.v9i8.2942
Chen-Hua Shih and Yaw-Chung Chen, “A FMIPv6 Based Handover Scheme for Real- Time Applications in Mobile WiMAX,” JOURNAL OF NETWORKS, vol. 5, pp. 929- 936, August 2010.
http://dx.doi.org/10.4304/jnw.5.8.929-936
Christoforos Ntantogian, Christos Xenakis, and Ioannis Stavrakakis, "A generic mechanism for efficient authentication in B3G networks", Computers & Security, vol. 29, pp. 460-475, 2010.
http://dx.doi.org/10.1016/j.cose.2009.11.001
Alezabi, K.A.; Hashim, F.; Hashim, S.J.; Ali, B.M., "A new tunnelled EAP based authentication method for WiMAX networks," Communications (MICC), 2013 IEEE Malaysia International Conference on , vol., no., pp.412,417, 26-28 Nov. 2013 doi: 10.1109/MICC.2013.6805864
http://dx.doi.org/10.1109/micc.2013.6805864
A. Rai, V. Kumar, and S. Mishra, “An efficient password authenticated key exchange protocol for wlan and wimax,” in Proceedings of the In- ternational Conference & Workshop on Emerging Trends in Technology, pp. 881–885, ACM, 2011.
http://dx.doi.org/10.1145/1980022.1980212
T.Shon, B.Koo, J.Park, H.Chang, "Novel approaches to enhance mobile WiMAX security," EURASIP Journal on Wireless Communications and Networking, vol. 2010, pp. 1-11, July 2010.
http://dx.doi.org/10.1155/2010/926275
The Network Simulator - ns-2, http://www.isi.edu/nsnam/ns/.
Seamless and Secure Handover, http://www.nist.gov/itl/antd/emntg/ssm_tools.cfm
S.-Y. Tang, P. Muller, and H. Sharif, WiMAX security and quality of service: an end-to-end perspective. Wiley. com, 2011.
http://dx.doi.org/10.1002/9780470665749
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cu´ellar, P. H. Drielsma, P.-C. H´eam, O. Kouchnarenko, J. Mantovani, et al., “The avispa tool for the automated validation of internet security protocols and applications,” in Computer Aided Verification, pp. 281– 285, Springer, 2005.
http://dx.doi.org/10.1007/11513988_27
Slimani, A., Bennani, S.D., El Alami, A., Harkat, H., Conception and optimization of patch array antenna for WiMAX applications using stubs and slots techniques matching, (2015) International Journal on Communications Antenna and Propagation (IRECAP), 5 (1), pp. 39-45.
http://dx.doi.org/10.15866/irecap.v5i1.5179
Lakshmanan, M., Mallick, P.S., Nityanandan, L., Sai Krishna, M., Efficient carrier frequency offset estimation method in uplink OFDMA for mobile WiMax, (2015) International Journal on Communications Antenna and Propagation (IRECAP), 5 (3), pp. 132-137.
http://dx.doi.org/10.15866/irecap.v5i3.5676
Ismael, F.E., Yusof, S.K.S., Fisal, N., Bandwidth grant algorithm for delay reduction in IEEE 802.16j MMR WiMAX networks, (2013) International Journal on Communications Antenna and Propagation (IRECAP), 3 (2), pp. 140-145.
Ramya, S., Nagarajan, N., Kaarthick, B., Real Time Performance Analysis of DBA Algorithm Using Network Processors, (2013) International Journal on Information Technology (IREIT), 1 (6), pp. 331-338.
Razeghi, B., Bagherzadeh, S., Hosseinpour, M., Ramezani, A., Saraninezhad, M., A Low Voltage Low Power Triple-Band CMOS LNA with Forward Body Biasing Technique, (2013) International Journal on Information Technology (IREIT), 1 (2), pp. 105-109.
Refbacks
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize