Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects

Seamless roaming over wireless networks is highly desirable to mobile users, but ensuring the security and efficiency of this process is challenging. Although the same may be said for all communication systems, roaming services have special requirements and vulnerabilities, and therefore deserve special attention. Over the years, we have seen a variety of authentication protocols emerging to address this issue. However, which protocol is the most effective is still debatable. In this article, we first identify the challenges unique to roaming services as a set of mandatory and optional requirements. Next, we provide a brief state-of-the-art survey of existing work and point out their limitations in securing roaming services, especially in resistance against denial of service attacks, efficient authentication, flexible roaming in mobile contexts, as well as backward and forward non-linkabilities. To complement the security provided by the existing work, we then propose some mechanisms that can meet the aforementioned security and efficiency requirements. Finally, we present challenges that need to be addressed in roaming authentication.

[1]  Bart Preneel,et al.  A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks , 2008, WiSec '08.

[2]  Xiaoyan Hong,et al.  Situation-aware trust architecture for vehicular networks , 2010, IEEE Communications Magazine.

[3]  Lidong Chen,et al.  Where EAP security claims fail , 2007, QSHINE.

[4]  Ari Juels,et al.  $evwu Dfw , 1998 .

[5]  Chun Chen,et al.  Strong roaming authentication technique for wireless and mobile networks , 2013, Int. J. Commun. Syst..

[6]  Chun Chen,et al.  Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.

[7]  Xiaotie Deng,et al.  Universal authentication protocols for anonymous wireless communications , 2010, IEEE Transactions on Wireless Communications.

[8]  Chun Chen,et al.  Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks , 2013, IEEE Transactions on Computers.

[9]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[10]  MohapatraPrasant,et al.  Non-cryptographic authentication and identification in wireless networks , 2010 .

[11]  Xiaotie Deng,et al.  Anonymous and Authenticated Key Exchange for Roaming Networks , 2007, IEEE Transactions on Wireless Communications.

[12]  Chun Chen,et al.  Privacy-Preserving Universal Authentication Protocol for Wireless Communications , 2011, IEEE Transactions on Wireless Communications.

[13]  N. Asokan,et al.  Untraceability in mobile networks , 1995, MobiCom '95.