Secure fast WLAN handoff using time-bound delegated authentication

被引:2
|
作者
Chien, Hung-Yu [1 ]
Hsu, Tzu-Hang [2 ]
机构
[1] Natl Chi Nan Univ, Dept Informat Management, Nantou 545, Taiwan
[2] Chaoyang Univ Technol, Dept Informat Management, Taichung, Taiwan
关键词
security; wireless local area network; authentication; secret key; handoff; symmetric polynomial;
D O I
10.1002/dac.983
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To support multimedia applications with good quality of services for roaming wireless local area network users, it is imperative to reduce the long re-authentication latency that users experience during handoff among access points (APs). Athough a great deal of research resources have been put into the reduction of the re-authentication latency, these schemes developed so far seem to either suffer from heavy overhead problems or have weak security. In this paper, we propose a novel approach to reducing the re-authentication latency. With the authentication server (AS) periodically delegating its authentication authority to the authenticated APs, the APs can authenticate the roaming users on behalf of the AS. As our performance analysis and simulation results demonstrate, our new approach is capable of greatly reducing the latency and overhead while achieving a high security level. Furthermore, it does not increase the complexity on the AP side because only the already existing four-way handshake with new keying mechanism is required. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:565 / 584
页数:20
相关论文
共 50 条
  • [21] Selective active scanning for fast handoff in WLAN using sensor networks
    Waharte, S
    Ritzenthaler, K
    Boutaba, R
    MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2005, 162 : 59 - 70
  • [22] New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 133 - 138
  • [23] New constructions for provably-secure time-bound hierarchical key assignment schemes
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    THEORETICAL COMPUTER SCIENCE, 2008, 407 (1-3) : 213 - 230
  • [24] A Secure Fast Handoff Mechanism Based on Pre-authentication for High-speed Trains
    Zhao Y.
    Tian B.
    Chen Z.
    Ding J.
    Su H.
    Tiedao Xuebao/Journal of the China Railway Society, 2020, 42 (06): : 64 - 69
  • [25] A Secure Authentication Protocol for IoT-WLAN Using EAP Framework
    Yadav, Awaneesh Kumar
    Misra, Manoj
    Pandey, Pradumn Kumar
    Ranaweera, Pasika
    Liyanage, Madhusanka
    Kumar, Neeraj
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 49 - 65
  • [26] A countable and time-bound password-based user authentication scheme for the applications of electronic commerce
    Lin, Iuon-Chang
    Chang, Chin-Chen
    INFORMATION SCIENCES, 2009, 179 (09) : 1269 - 1277
  • [27] A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem
    Yeh, Jyh-haw
    INFORMATION PROCESSING LETTERS, 2008, 105 (04) : 117 - 120
  • [28] Seamless Vertical Handoff Using Authentication Certificate in GPRS-WLAN Tightly Coupled Integrated Networks
    Usman, Muhammad
    Noshairwan, Wajahat
    Gilani, Mushhad
    Irshad, Azeem
    Irshad, Ehtsham
    2008 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS, 2008, : 199 - 204
  • [29] Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting
    Yi, Xun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (02) : 303 - 304
  • [30] A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security
    Chien, Hung-Yu
    Chen, Ying-Lun
    Lo, Chien-Feng
    Huang, Yuh-Ming
    ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2010, 6104 : 407 - 417