Handover Optimised Authentication Scheme for High Mobility Wireless Multicast

In this paper a distributed handover optimized authentication scheme based on independent session key per access network (HOISKA) is developed for the decentralized multi-service group key management scheme over wireless mobile multicast. It enables a handover user Mi involved in multiple multicast service subscriptions to securely reuse the long term credential initially issued by the trusted authentication server (As) for deriving unique session keys per access network as it performs handover authentication across various access networks. The distributed nature of the scheme enables offloading the authentication function to the area network controllers (AKDs) such that As is not involved during handover exchange authentication signaling. This simplifies handover by reducing handover exchange signalling constituting to handover delays. Handover Access authentication (HAA) phase in HOISKA is presented then analyzed using the delay analytical model. The model proves efficacy by inducing minimum delays with less handover blocking probability while providing same level of security to the widely deployed handover authentication scheme.

[1]  Raed A. Abd-Alhameed,et al.  Novel rekeying approach for secure multiple multicast groups over wireless mobile networks , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[2]  Yacine Challal,et al.  Group Key Management Protocols: A Novel Taxonomy , 2008 .

[3]  T. Charles Clancy,et al.  Handover Key Management and Re-Authentication Problem Statement , 2008, RFC.

[4]  Frank Xia,et al.  Fast Handovers for Proxy Mobile IPv6 , 2010, RFC.

[5]  Yacine Challal,et al.  Key management with host mobility in dynamic groups , 2010, SIN.

[6]  Hongke Zhang,et al.  An authentication method for proxy mobile IPv6 and performance analysis , 2009, Secur. Commun. Networks.

[7]  Charles E. Perkins,et al.  Context Transfer Protocol (CXTP) , 2005, RFC.

[8]  Trust TshepoMapoka Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey , 2013 .

[9]  Ian F. Akyildiz,et al.  An inter-system handoff technique for the IMT-2000 system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[10]  Yanghee Choi,et al.  Fast-handoff support in IEEE 802.11 wireless networks , 2007, IEEE Communications Surveys & Tutorials.

[11]  Raed A. Abd-Alhameed,et al.  Efficient authenticated multi-service group key management for secure wireless mobile multicast , 2014, Third International Conference on Future Generation Communication Technologies (FGCT 2014).

[12]  Samuel Pierre,et al.  An Analytical Framework for Performance Evaluation of IPv6-Based mobility Management Protocols , 2008, IEEE Transactions on Wireless Communications.

[13]  Trust T. Mapoka,et al.  Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey , 2013 .

[14]  Miss Laiha Mat Kiah,et al.  Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments , 2007, Future Generation Communication and Networking (FGCN 2007).

[15]  Raed A. Abd-Alhameed,et al.  Multi-Service Group Key Establishment for Secure Wireless Mobile Multicast Networks , 2014 .

[16]  Simon J. Shepherd,et al.  A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast , 2015, IEEE Transactions on Mobile Computing.

[17]  Ilsun You,et al.  Enabling a Paging Mechanism in Network-Based Localized Mobility Management Networks , 2009 .