Abstract
This paper proposes a hash-chain based authentication scheme for fast handover in wireless network (HAS). The full authentication procedure described in IEEE 802.11 is inappropriate to be applied to a handover, since it has heavy operation and delay time during handover. Though various methods were proposed to solve the problem, the existing schemes degrade the security of authentication or impose the entire administrative burden of the authentication on the authentication server. The main focus of this paper is on reducing the administrative burden of the authentication server and enhances the security strength of the fast handover authentication. The proposed scheme in this paper is robust to the attack by a compromised AP by using hash key chain between a mobile station and the authentication server. The scheme also decentralizes the administrative burden of the authentication server to other network entities.
This work was supported by the Korea Research Foundation Grant (M07-2004-000-10295-0). This research is supported by the ubiquitous Autonomic Computing and Network Project, the Ministry of Information and Communication (MIC) 21st Century Frontier R&D Program in Korea.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
IEEE standard, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE 802.11 (1999)
IEEE standard, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Medium Access Control (MAC) Security Enhancements, IEEE 802.11i (2004)
IEEE standard, Port-Based Network Access Control, IEEE 802.1x (2001)
IEEE standard, IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems, IEEE 802.11f (2003)
Aboba, B., Simon, D.: PPP EAP TLS Authentication Protocol, IETF RFC 2716 (October 1999)
Pack, S., Choi, Y.: Fast handoff scheme based on mobility prediction in public wireless LAN systems. IEE Proceedings Communications 151(5), 489–495 (2004)
Mishra, A., Shin, M.H., Petroni Jr., N.L., Clancy, T.C., Arbauch, W.A.: Proactive key distribution using neighbor graphs. IEEE Wireless Communications 11(1), 26–36 (2004)
Mishra, A., Shin, M.H., Arbauch, W.A.: Context Caching using Neighbour Graphs for Fast Handoffs in a Wireless Network. In: Proc. of IEEE INFOCOM, Hong Kong (March 2004)
Wang, H., Prasad, A.R.: Fast Authentication for Inter-domain Handover. In: de Souza, J.N., Dini, P., Lorenz, P. (eds.) ICT 2004. LNCS, vol. 3124, pp. 973–982. Springer, Heidelberg (2004)
Bargh, M.S., Hulsebosch, R.J., Eertink, E.H., Prasad, A., Wang, H., Schoo, P.: Fast Authentication Methods for Handovers between IEEE 802.11 Wireless LANs. In: WMASH 2004 (October 1, 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hong, K., Jung, S., Wu, S.F. (2006). A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. In: Song, JS., Kwon, T., Yung, M. (eds) Information Security Applications. WISA 2005. Lecture Notes in Computer Science, vol 3786. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11604938_8
Download citation
DOI: https://doi.org/10.1007/11604938_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31012-9
Online ISBN: 978-3-540-33153-7
eBook Packages: Computer ScienceComputer Science (R0)