This Article 
 Bibliographic References 
 Add to: 
Cost-Effective Caching for Mobility Support in IEEE 802.1X Frameworks
November 2006 (vol. 5 no. 11)
pp. 1547-1560
This paper is concerned with caching support of access points (APs) for fast handoff within IEEE 802.11 networks. A common flavor of current schemes is to let a mobile station preauthenticate or distribute the security context of the station proactively to neighboring APs. Each target AP caches the received context beforehand and can save itself backend-network authentication if the station reassociates. We present an approach to ameliorating cache effectiveness under the least recently used (LRU) replacement policy, additionally allowing for distinct cache miss penalty indicative of authentication delay. We leverage the widely used LRU caching techniques to effect a new model where high-penalty cache entries are prevented from being prematurely evicted under the conven-tional replacement policy so as to save frequent, expensive authentications with remote sites. This is accomplished by introducing software-generated reference requests that trigger cache hardware machinery in APs to refresh certain entries in an automated manner. Performance evaluations are conducted using simulation and analytical modeling. Performance results show that our approach, when compared with the base LRU scheme, reduces authentication delay by more than 51 percent and cache miss ratio by over 28 percent on average. Quantitative and qualitative discussions indicate that our approach is applicable in pragmatic settings.

[1] K. Ahmavaara, H. Haverinen, and R. Pichna, “Interworking Architecture between 3GPP and WLAN Systems,” IEEE Comm. Magazine, vol. 41, no. 11, pp. 74-81, Nov. 2003.
[2] A. Mishra, M.H. Shin, and W. Arbaugh, “An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process,” ACM Computer Comm. Rev., vol. 2, no. 33, pp. 93-102, Apr. 2003.
[3] I.S. 802.11, Information Technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control MAC and Physical Layer (PHY) Specifications, Nov. 1999.
[4] I. P802.1x/D11, Standards for Local Area and Metropolitan Area Networks: Standard for Port Based Network Access Control, Mar. 2001.
[5] I.S. 802.11i, IEEE Standard for Telecommunications and Information Exchange between Systems—LAN/MAN—LAN/MAN Specific Requirements—Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 6: Medium Access Control (MAC) Security Enhancements, June 2004.
[6] M.H. Shin, A. Mishra, and W. Arbaugh, “Improving the Latency of 802.11 Handoffs Using Neighbor Graphs,” Proc. Second Int'l Conf. Mobile Systems, Applications, and Services, pp. 70-83, 2004.
[7] C.-C. Tseng, K.-H. Chi, M.-D. Hsieh, and H.-H. Chang, “Location-Based Fast Handoff for 802.11 Networks,” IEEE Comm. Letters, vol. 9, no. 4, pp. 304-306, Apr. 2005.
[8] I.802.11f, Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol across Distribution Systems Supporting IEEE 802.11 Operation, July 2003.
[9] A. Mishra, M.H. Shin, and W. Arbaugh, “Context Caching Using Neighbor Graphs for Fast Handoffs in a Wireless Network,” Proc. 23rd IEEE Conf. Computer Comm. (Infocom 2004), 2004.
[10] A. Mishra, M.H. Shin, N.L. PetroniJr., T.C. Clancy, and W.A. Arbaugh, “Proactive Key Distribution Using Neighbor Graphs,” IEEE Wireless Comm., vol. 11, no. 1, pp. 26-36, Feb. 2004.
[11] S. Pack and Y. Choi, “Fast Inter-AP Handoff Using Predictive Authentication Scheme in a Public Wireless LAN,” Proc. IEEE Networks Conf. '02, Aug. 2002.
[12] S. Pack and Y. Choi, “Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model,” Proc. IFIP Personal Wireless Comm. Conf. '02, pp. 175-182, Oct. 2002.
[13] S. Pack, H. Jung, T. Kwon, and Y. Choi, “SNC: A Selective Neighbor Caching Scheme for Fast Handoff in IEEE 802.11 Wireless Networks,” ACM Mobile Computing and Comm. Rev., to appear.
[14] H. Duong, A. Dadej, and S. Gordon, “Proactive Context Transfer and Forced Handover in IEEE 802.11 Wireless LAN-Based Access Networks,” ACM Mobile Computing and Comm. Rev., vol. 9, no. 3, pp. 32-44, July 2005.
[15] B. Aboba and D. Simon, “PPP EAP TLS Authentication Protocol,” RFC 2716, IETF Network Working Group, Oct. 1999.
[16] L. Blunk, J. Vollbrecht, and B. Aboba, The One Time Password (OTP) and Generic Token Card Authentication Protocols, Internet draft, draft-ietf-pppext-otp-01.txt, IETF Network Working Group, May 2002.
[17] H. Haverinen and J. Salowey, Extensible Authentication Protocol Method for GSM Subscriber Identity Modules (EAP-SIM), Internet draft, draft-haverinen-pppext-eap-sim-16.txt, Internet Eng. Task Force, Network Working Group, Dec. 2004.
[18] D. Barbará, “Mobile Computing and Databases—A Survey,” IEEE Trans. Knowledge and Data Eng., vol. 11, no. 1, pp. 108-117, Jan.-Feb. 1999.
[19] J. Jing, A. Helal, and A. Elmagarmid, “Client-Server Computing in Mobile Environments,” ACM Computing Surveys, vol. 31, no. 2, pp.117-157, June 1999.
[20] N. Krishnakumar and R. Jain, “Escrow Techniques for Mobile Sales and Inventory Applications,” ACM Wireless Networks, vol. 3, no. 3, pp. 235-246, 1997.
[21] W.-C. Peng and M.-S. Chen, “Design and Performance Studies of an Adaptive Cache Retrieval Scheme in a Mobile Computing Environment,” IEEE Trans. Mobile Computing, vol. 4, no. 1, pp. 29-40, Jan.-Feb. 2005.
[22] E. Pitoura and G. Samaras, Data Management for Mobile Computing. Kluwer Academic, 1998.
[23] J. Xu, Q. Hu, D.L. Lee, and W.-C. Lee, “SAIU: An Efficient Cache Replacement Policy for Wireless On-Demand Broadcasts,” Proc. Ninth Int'l Conf. Information and Knowledge Management, pp. 46-53, 2000.
[24] N. Megiddo and D. Modha, “Outperforming LRU with an Adaptive Replacement Cache,” Computer, vol. 37, no. 4, pp. 58-65, Apr. 2004.
[25] E. Scheuermann, J. Shim, and R. Vingralek, “A Case for Delay-Conscious Caching of Web Documents,” Proc. Sixth Int'l World Wide Web Conf., Apr. 1997.
[26] S. Jin and A. Bestavros, “Greedy-Dual* Web Caching Algorithm,” Int'l J. Computer Comm., vol. 24, no. 2, pp. 174-183, Feb. 2001.
[27] A. Balamash and M. Krunz, “An Overview of Web Caching Replacement Algorithms,” IEEE Comm. Surveys and Tutorials, vol. 6, no. 2, pp. 44-56, 2004.
[28] J. Wang, “A Survey of Web Caching Schemes for the Internet,” ACM Computer Comm. Rev., vol. 25, no. 9, pp. 36-46, 1999.
[29] W.C. King, “Analysis of Paging Algorithms,” Proc. IFIP 1971 Congress, pp. 485-490, Aug. 1971.
[30] L. Kleinrock, Queueing Systems, Vol I: Theory. John Wiley and Sons, 1975.
[31] O.I. Aven, E.G. CoffmanJr., and Y.A. Kogan, Stochastic Analysis of Computer Storage. D. Reidel, Apr. 1987.
[32] J. Case, M. Fedor, M. Schoffstall, and J. Davin, “A Simple Network Management Protocol (SNMP),” RFC 1157, IETF Network Working Group, May 1990.
[33] A. Leon-Garcia, Probability and Random Processes for Electrical Engineering, second ed. Addison-Wesley, 1994.
[34] D.E. Knuth, The Art of Computer Programming, vol. 3, second ed. Addison-Wesley, 1998.
[35] S.M. Ross, Stochastic Processes. John Wiley and Sons, 1996.
[36] R. Fagin and T.G. Price, “Efficient Calculation of Expected Miss Ratios in the Independent Reference Model,” SIAM J. Computers, vol. 7, no. 3, pp. 288-297, 1978.
[37] P. Flajolet, D. Gardy, and L. Thimonier, “Birthday Paradox, Coupon Collectors Caching Algorithms and Self-Organizing Search,” Discrete Applied Math., vol. 39, pp. 207-229, 1992.
[38] A.M. Makowski and S. Vanichpun, “Comparing Locality of Reference—Some Folk Theorems for the Miss Rates and the Output of Caches,” Technical Report CSHCN TR 2004-6 (ISR TR 2004-10), Center for Satellite and Hybrid Comm. Networks, Univ. of Maryland, 2004.

Index Terms:
Wireless Local Area Network, cache, fast handoff, independent reference model, Robust Security Network.
Kuang-Hui Chi, Ji-Han Jiang, Li-Hsing Yen, "Cost-Effective Caching for Mobility Support in IEEE 802.1X Frameworks," IEEE Transactions on Mobile Computing, vol. 5, no. 11, pp. 1547-1560, Nov. 2006, doi:10.1109/TMC.2006.160
Usage of this product signifies your acceptance of the Terms of Use.