FSH scheme for high-speed handover and anti-MITM on mobile computing

As an IEEE 802.11-based mobile computing system has been established as the base structure of high-speed wireless network, interest in mobility and security of mobile terminal has increased. To reinforce security, 802.1x and 802.11i using EAP were used in standardized instrument. But it was found to be unsuitable for real time multimedia service because of the time delay. In this paper, we suggest Fast and Secure Handover (FSH) scheme which minimizes time delay in handover authentication process and prevents MITM (Man in the Middle) attack. This scheme carries out re-association process which is necessary for high-speed handover using Inter Access Point Protocol (IAPP) and Old_MSK. To make existing 802.1x-based user certification procedure suitable for high-speed handover, the terminal and pre-handover-accessed Old_AP make Rough_AP to prevent MITM. To do this, Old_AP uses the Old_MSK-used encrypted method which was used to encrypt MAC information of the mobile terminal and Old_AP. Hereby, FSH has been developed to become high-speed handover which has the 802.1x-supported security level and the skill of preventing MITM. In this paper, by simulation (NS-2), we confirmed the superiority in streaming service such as decreased handover time delay and VoIP.

[1]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[2]  William A. Arbaugh,et al.  Improving the latency of 802.11 hand-offs using neighbor graphs , 2004, MobiSys '04.

[3]  T. S. Randhawa,et al.  Saturation throughput analysis of IEEE 802.11e enhanced distributed coordination function , 2004, IEEE Journal on Selected Areas in Communications.

[4]  William A. Arbaugh,et al.  An empirical analysis of the IEEE 802.11 MAC layer handoff process , 2003, CCRV.

[5]  Troels B. Sørensen,et al.  In-Band Interference Effects on UTRA LTE Uplink Resource Block Allocation , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[6]  M. Kassab,et al.  Fast and Secure Handover in WLANs: An Evaluation of the Signaling Overhead , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[7]  Prashant Krishnamurthy,et al.  A QoS-based indoor wireless data network design for VoIP applications , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).

[8]  Rajendra Persaud,et al.  Fast Re-authentication for Handovers in Wireless Communication Networks , 2006, Networking.

[9]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[10]  Aggelos Kiayias,et al.  Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.

[11]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[12]  Madjid Nakhjiri,et al.  AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility , 2005 .

[13]  Henning Schulzrinne,et al.  Reducing MAC layer handoff latency in IEEE 802.11 wireless LANs , 2004, MobiWac '04.