Secure fast WLAN handoff using time-bound delegated authentication

被引:2
|
作者
Chien, Hung-Yu [1 ]
Hsu, Tzu-Hang [2 ]
机构
[1] Natl Chi Nan Univ, Dept Informat Management, Nantou 545, Taiwan
[2] Chaoyang Univ Technol, Dept Informat Management, Taichung, Taiwan
关键词
security; wireless local area network; authentication; secret key; handoff; symmetric polynomial;
D O I
10.1002/dac.983
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To support multimedia applications with good quality of services for roaming wireless local area network users, it is imperative to reduce the long re-authentication latency that users experience during handoff among access points (APs). Athough a great deal of research resources have been put into the reduction of the re-authentication latency, these schemes developed so far seem to either suffer from heavy overhead problems or have weak security. In this paper, we propose a novel approach to reducing the re-authentication latency. With the authentication server (AS) periodically delegating its authentication authority to the authenticated APs, the APs can authenticate the roaming users on behalf of the AS. As our performance analysis and simulation results demonstrate, our new approach is capable of greatly reducing the latency and overhead while achieving a high security level. Furthermore, it does not increase the complexity on the AP side because only the already existing four-way handshake with new keying mechanism is required. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:565 / 584
页数:20
相关论文
共 50 条
  • [1] Time-Bound Anonymous Authentication for Roaming Networks
    Liu, Joseph K.
    Chu, Cheng-Kang
    Chow, Sherman S. M.
    Huang, Xinyi
    Au, Man Ho
    Zhou, Jianying
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) : 178 - 189
  • [2] An authentication method for fast handoff in WLAN mesh networks
    Peng Q.
    Pei Q.
    Pang L.
    Ma J.
    Jiangsu Daxue Xuebao (Ziran Kexue Ban)/Journal of Jiangsu University (Natural Science Edition), 2010, 31 (04): : 458 - 463
  • [3] A Time-Bound Continuous Authentication Protocol for Mesh Networking
    Shrestha, Selina
    Lopez, Martin Andreoni
    Baddeley, Michael
    Muhaidat, Sami
    Giacalone, Jean-Pierre
    2021 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGIES AND NETWORKING (COMMNET'21), 2021, : 137 - 142
  • [4] Fast handoff authentication scheme of WLAN based on self-encryption
    Research Centre of Information Security, Southeast University, Nanjing 210096, China
    Dongnan Daxue Xuebao, 2007, 6 (945-949):
  • [5] A secure and efficient time-bound hierarchical key assignment scheme
    Chien, Hung-Yu
    Tang, Yuan-Liang
    Chen, Ying-Lun
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 371 - +
  • [6] A secure and efficient time-bound hierarchical access control scheme for secure broadcasting
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    International Journal of Ad Hoc and Ubiquitous Computing, 2016, 22 (04) : 236 - 248
  • [7] TIME-BOUND BASED AUTHENTICATION SCHEME FOR MULTI-SERVER ARCHITECTURE
    Chang, Chin-Chen
    Lee, Jung-San
    Ku, Jui-Yi
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (11): : 2987 - 2996
  • [8] A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems
    Victor R. L. Shen
    Wei-Chieh Huang
    Wireless Personal Communications, 2015, 85 : 1741 - 1764
  • [9] An efficient time-bound hierarchical key management scheme for secure broadcasting
    Bertino, Elisa
    Shang, Ning
    Wagstaff, Samuel S., Jr.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (02) : 65 - 70
  • [10] A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems
    Shen, Victor R. L.
    Huang, Wei-Chieh
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) : 1741 - 1764