Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks

In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN, and WiMAX-Advanced (WiMAX-A) interworking architecture. The proposed protocols are applicable to 5G networks. With the consideration of the existing standard authentication protocols, a new set of authentication and re-authentication protocols has been reinvented to provide fast and secure handovers (HO) in the current 4G and the next 5G networks. The proposed authentication protocols can be invoked when the users perform a vertical HO (between different networks) for the first time, whereas the re-authentication protocols can be invoked when the users perform a horizontal HO (within the same network domain). These protocols provide an efficient method to protect user identity and reduce the burden on the authentication server (AS) during the sequential handovers. The results of the analytical model show that the proposed protocols achieve better performance than standard and other protocols. The reduction of handover cost, handover delay, and energy consumption in the proposed protocols reaches up to 22%, 44%, and 17%, respectively. In addition, the verification tools show that the proposed protocols are secure, dependable, and prevent all types of authentication and secrecy attacks.

[1]  Jianfeng Ma,et al.  A USIM-Based Uniform Access Authentication Framework in Mobile Communication , 2011, EURASIP J. Wirel. Commun. Netw..

[2]  Abbas Jamalipour,et al.  On the authentication and re‐authentication protocols in LTE‐WLAN interworking architecture , 2017, Trans. Emerg. Telecommun. Technol..

[3]  Shaiful Jahari Hashim,et al.  A new tunnelled EAP based authentication method for WiMAX networks , 2013, 2013 IEEE 11th Malaysia International Conference on Communications (MICC).

[4]  Adão Silva,et al.  Power allocation strategies for distributed precoded multicell based systems , 2011, EURASIP J. Wirel. Commun. Netw..

[5]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[6]  Kuei-Li Huang,et al.  A Fast Authentication Scheme for WiMAX–WLAN Vertical Handover , 2013, Wirel. Pers. Commun..

[7]  Hilde van der Togt,et al.  Publisher's Note , 2003, J. Netw. Comput. Appl..

[8]  Li Xu,et al.  An anonymous batch handover authentication protocol for big flow wireless mesh networks , 2018, EURASIP Journal on Wireless Communications and Networking.

[9]  Tai-Myoung Chung,et al.  A Traffic Analysis of Authentication Methods for Proxy Mobile IPv6 , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[10]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[11]  Victor C. M. Leung,et al.  Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers , 2011, IEEE Transactions on Dependable and Secure Computing.

[12]  Jari Arkko,et al.  Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA') , 2009, RFC.

[13]  Pejman Roshan,et al.  802.11 Wireless LAN Fundamentals , 2004 .

[14]  Ahmed A. Abdel Hafez,et al.  New Authentication and Key Agreement Protocol for LTE-WLAN Interworking , 2013 .

[15]  T. Charles Clancy,et al.  Handover Key Management and Re-Authentication Problem Statement , 2008, RFC.

[16]  Mourad Debbabi,et al.  A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks , 2013, Secur. Commun. Networks.

[17]  Noureddine Zahid,et al.  A new fast re-authentication method for the 3G-WLAN interworking based on EAP-AKA , 2013, ICT 2013.

[18]  Garima Singh,et al.  A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks , 2018, Sādhanā.

[19]  Ian F. Akyildiz,et al.  Intersystem location update and paging schemes for multitier wireless networks , 2000, MobiCom '00.

[20]  Liping Zhang,et al.  An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks , 2016, J. Netw. Comput. Appl..

[21]  Willy Susilo,et al.  Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment , 2020, IEEE Transactions on Dependable and Secure Computing.

[22]  Jung-Hui Chiu,et al.  Fast Handover Pre-Authentication Protocol in 3GPP-WLAN Heterogeneous Mobile Networks , 2014 .

[23]  Martin Nilsson,et al.  Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[24]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[25]  John Linn,et al.  The Kerberos Version 5 GSS-API Mechanism , 1996, RFC.

[26]  Noureddine Zahid,et al.  An Efficient Authentication Protocol for 5G Heterogeneous Networks , 2017, UNet.

[27]  Russ Housley,et al.  Guidance for Authentication, Authorization, and Accounting (AAA) Key Management , 2007, RFC.

[28]  Luo Hong JAVA Security Architecture , 2000 .

[29]  G. J. A. Stern,et al.  Queueing Systems, Volume 2: Computer Applications , 1976 .

[30]  V. Muthukkumarasamy,et al.  EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability , 2013 .

[31]  Todor Cooklev,et al.  Air Interface for Fixed Broadband Wireless Access Systems , 2004 .

[32]  Jin Cao,et al.  EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks , 2018, J. Netw. Comput. Appl..

[33]  Jung-Hui Chiu,et al.  The performance evaluation of fast iterative localized re-authentication for 3G/UMTS-WLAN interworking networks , 2013, J. Ambient Intell. Humaniz. Comput..

[34]  Jari Arkko,et al.  Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) , 2006, RFC.

[35]  Shaiful Jahari Hashim,et al.  An efficient authentication and key agreement protocol for 4G (LTE) networks , 2014, 2014 IEEE REGION 10 SYMPOSIUM.

[36]  Rongxing Lu,et al.  EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks , 2015, Peer Peer Netw. Appl..