The Community for Technology Leaders
RSS Icon
Issue No.05 - September/October (2011 vol.8)
pp: 699-713
Ali Al Shidhani , University of British Columbia, Vancouver
Victor C.M. Leung , University British Columbia, Vancouver
Wireless technologies such as the Wireless Local Area Network (WLAN), the Worldwide Interoperability for Microwave Access (WiMAX), and the Third-Generation (3G) mobile communications system complement each other to support a variety of services suited for the home, urban, and global environments. As roaming users expect a seamless handover (HO) experience when switching from one wireless network to another, fast and secure HO operations must be supported by the networks. In this paper, we present and analyze five reauthentication protocols for HOs between WiMAX and WLANs by subscribers of networks conforming to the 3G Partnership Project (3GPP) standards. Our proposed protocols achieve outstanding performance results compared to standard protocols in terms of reauthentication signaling traffic and reauthentication delay, while fulfilling essential HO security requirements such as the provision of mutual authentication and forward and backward secrecy.
Delay, EAP-AKA, handover, reauthentication, WiMAX-WLAN interworking, wireless.
Ali Al Shidhani, Victor C.M. Leung, "Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers", IEEE Transactions on Dependable and Secure Computing, vol.8, no. 5, pp. 699-713, September/October 2011, doi:10.1109/TDSC.2010.39
[1] IEEE "Air Interface for Fixed Broadband Wireless Access Systems, Part 16, Amendment 2 and Corrigendum 1," IEEE Std 802.16e-2005 and IEEE Std 802.16-2004/Cor1-2005.
[2] The WiMAX Forum,, 2010.
[3] The Third Generation Partnership Project (3GPP),, 2010.
[4] P. TalebiFard, T. Wong, and V.C.M. Leung, "Access and Service Convergence over the Mobile Internet—A Survey," Computer Networks, vol. 54, no. 4, Mar. 2010.
[5] 3GPP, 3GPP System to Wireless Local Area Network Interworking, System Description (Release 7), TS 23.234 v.7.2.0, June 2006.
[6] WiMAX Forum Network Architecture—Stage 2 "Architecture Tenets, Reference Model and Reference Points 3GPP—WiMAX Interworking," Rel. 1, ver. 1.2, Jan. 2008.
[7] 3GPP, "3G Security; WLAN Interworking Security (Release 7)," 3GPP TS 33.234 v7.0.0, Mar. 2006.
[8] WiMAX Forum Network Architecture—Stage 3 "Detailed Protocols and Procedures," Rel. 1, ver. 1.2, Jan. 2008.
[9] Z. Yan, H. Zhou, H. Zhang, H. Luo, and S. Zhange, "A Dual Threshold-Based Fast Vertical HO Scheme with Authentication Support," Proc. Int'l Conf. Mobile Technology, Applications, and Systems, Sept. 2008.
[10] F. Panken, G. Hoekstra, D. Barankanira, C. Francis, R. Schwendener, O. Grøndalen, and M. Jaatun, "Extending 3G/WiMAX Networks and Service through Residential Access Capacity," IEEE Comm. Magazine, vol. 45, no. 12, pp. 62-69, Dec. 2007.
[11] J. Arkko and H. Haverinen, "Extensible Authentication Protocol Method for Third Generation Authentication and Key Agreement (EAP-AKA)," IETF RFC 4187, Jan. 2006.
[12] Y.-C. Chen, J.-H. Hsia, and Y.-J. Liao, "Advanced Seamless Vertical Handoff Architecture for WiMAX and WiFi Heterogeneous Networks with QoS Guarantees," Computer Comm., vol. 32, no. 2, pp. 281-293, Feb. 2009.
[13] Q. Zhang, C. Guo, Z. Guo, and W. Zhu, "Efficient Mobility Management for Vertical Handoff between WWAN and WLAN," IEEE Comm. Magazine, vol. 41, no. 11, pp. 102-108, Nov. 2003.
[14] Z. Dai, R. Fracchia, J. Gosteau, P. Pellati, and G. Vivier, "Vertical HO Criteria and Algorithm in IEEE 802.11 and 802.16 Hybrid Networks," Proc. IEEE Int'l Conf. Comm. (ICC '08), pp. 2480-2484, May 2008.
[15] L. Eastwood, S. Migaldi, Q. Xie, and V. Gupta, "Mobility Using IEEE 802.21 in a Heterogeneous IEEE 802.16/802.11-Based, IMT-Advanced (4G) Network," IEEE Wireless Comm., vol. 15, no. 2, pp. 26-34, Apr. 2008.
[16] J. Fabini, R. Pailer, and P. Reichl, "Location-Based Assisted Handover for the IP Multimedia Subsystem," Computer Comm., vol. 31, no. 10, pp. 2367-2380, June 2008.
[17] H.-M. Sun, S.-M. Chen, Y.-H. Chen, H.-J. Chung, and I.-H. Lin, "Secure and Efficient HO Schemes for Heterogeneous Networks," Proc. IEEE Asia-Pacific Services Computing Conf., pp. 205-210, Dec. 2008.
[18] R. Housley and B. Aboba, "Guidance for Authentication, Authorization and Accounting (AAA) Key Management," IETF RFC 4962, July 2007.
[19] M. Zhang and Y. Fang, "Security Analysis and Enhancements of 3GPP AKA Protocol," IEEE Trans. Wireless Comm., vol. 4, no. 2, pp. 734-742, Mar. 2005.
[20] V. Gondi and N. Agoulmine, "Secured Roaming over WLAN and WiMAX Networks," Proc. IEEE/IFIP Int'l Workshop Broadband Convergence Networks (BcN '07), May 2007.
[21] C. Ntantogian and C. Xenakis, "Reducing Authentication Traffic in 3G-WLAN Integrated Networks," Proc. IEEE 18th Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC '07), pp. 1-5, Sept. 2007.
[22] A. Al Shidhani and V. Leung, "Local Fast Re-Authentication Protocol for 3G-WLAN Interworking Architecture," Proc. Sixth Wireless Telecomm. Symp. (WTS '07), Apr. 2007.
[23] A. Al Shidhani and V.C.M. Leung, "Local Fast Re-Authentication for 3G-WLAN Interworking," Security Comm. Networks, vol. 1, no. 4, pp. 309-323, July/Aug. 2008.
[24] A. Al Shidhani and V.C.M. Leung, "Reducing Re-Authentication Delays during UMTS-WLAN Vertical Handovers," Proc. IEEE 19th Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC '08), pp. 1-5, Sept. 2008.
[25] 3GPP, 3GPP Technical Specifications, 3G Security; Security Architecture (Release 7), 3GPP TS 33.102 v7.0.0, Dec. 2005.
[26] A. Hess and G. Schäfer, "Performance Evaluation of AAA/Mobile IP Authentication," Proc. Second Polish-German Teletraffic Symp. (PGTS '02), Sept. 2002.
[27] N. Banerjee, W. Wu, S. Das, S. Dawkins, and J. Pathak, "Mobility Support in Wireless Internet," IEEE Wireless Comm., vol. 10, no. 5, pp. 54-61, Oct. 2003.
[28] T. Clancy, M. Nakhjiri, V. Narayanan, and L. Dondeti, "HO Key Management and Re-Authentication Problem Statement," IETF RFC 5169, Mar. 2008.
[29] S.-H. Lee, N.-S. Park, and J.-Y. Choi, "Secure Handover for Mobile WiMAX Networks," IEICE Trans. Information and System, vol. E91-D, no. 12, pp. 2875-2879, Dec. 2008.
[30] AVISPA—Automated Validation of Internet Security Protocols and Applications, http:/, 2010.
[31] S.-H. Lim, K.-S. Bang, O. Yi, and J. Lim, "A Secure HO Protocol Design in Wireless Networks with Formal Verification," Lecture Notes in Computer Science, pp. 67-78, Springer, 2007.
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool