TENCON 2007 - 2007 IEEE Region 10 Conference 2007
DOI: 10.1109/tencon.2007.4428890
|View full text |Cite
|
Sign up to set email alerts
|

Secure and fast handover scheme based on pre- authentication method for 802.16/WiMAX infrastructure networks

Abstract: 802.16/WiMAX is going to be the most popular technology in wireless communications. In 2006, IEEE 802.16e has been proposed for mobility issue. In order to maintain security, re-authentication should be considered when the mobile station handovers. However, re-authentication often takes latency and consumes power. On the other hand, several fast authentication schemes have been proposed based on preauthentication concept in 802.11/WLAN networks. These schemes provide different methods to enhance the efficiency… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…8: 1. Since the PMK cannot be shared across authenticator domains [10], MS generates new MSK and PMK keys:…”
Section: Inter-asn Handovermentioning
confidence: 99%
See 1 more Smart Citation
“…8: 1. Since the PMK cannot be shared across authenticator domains [10], MS generates new MSK and PMK keys:…”
Section: Inter-asn Handovermentioning
confidence: 99%
“…However, the scheme could not avoid the heavy computation cost since the scheme is based on the EAP transport layer security (TLS) authentication protocol. In [7], a handover pre-authentication scheme is proposed to enhance the security and the efficiency of the EAP [10]. Although the scheme prevents denial of service (DoS) and replay attacks and reduces the computation and communication costs of the EAP scheme, it fails to avoid the need to the third party.…”
Section: Introductionmentioning
confidence: 99%
“…In this case, the perfect forward and backward secrecy is not guaranteed. In order to solve this problem in our proposed scheme, the authorization key is derived as in (5). That is, the timestamp is included to derive PMK, based on which AK is generated.…”
Section: Perfect Forward and Backward Secrecymentioning
confidence: 99%
“…The reason for selecting [7] and [9] for comparison is that they have been designed under the same model of ASN architecture (Standalone Model) similarly to our proposed scheme. On the other hand, other security schemes such as [5][6] [8] have been designed under the Integrated Model and have not specified a detailed security protocol to be analyzed with the security attacks listed in Table 2. The PBS/PFS is classified into 2 types.…”
Section: Security and Performance Comparisonsmentioning
confidence: 99%
See 1 more Smart Citation