Efficient pre-authentication scheme for inter-ASN handover in high mobility MANET

Ensuring Quality of Service (QoS) and providing seamless connectivity are challenging in a mobile adhoc network. When Mobile Subscriber Station (MSS) moves between Access Service Network (ASNs), the authentication delay incurred during inter-ASN handover becomes a bottleneck. Pre-authentication of the MSSs at the target ASN (tASN) reduces the handover delay. Some existing pre-authentication schemes are prone to attacks. Modified EAP based Pre-authentication scheme using Improved ElGamal (MEPIE) proposed in this paper, modifies the existing Enhanced EAP based pre-Authentication scheme by using improved ElGamal digital signature and ElGamal encryption algorithm. To overcome the Denial of Service (DoS) and the replay attacks, MEPIE enhances ElGamal by using additional random variables. It outperforms the existing schemes in terms of Throughput, Packet Delivery Ratio (PDR), authentication delay, number of keys and Packet Loss Ratio (PLR) with negligible computation overhead.

[1]  Wei Li,et al.  Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol , 2018, SoutheastCon 2018.

[2]  Timothy X. Brown,et al.  Denial of service vulnerabilities in the 802.16 protocol , 2008, WICON 2008.

[3]  Candelaria Hernández-Goya,et al.  Self-organized authentication in mobile ad-hoc networks , 2009, Journal of Communications and Networks.

[4]  Mazleena Salleh,et al.  A novel authentication scheme for mobile environments in the context of Elliptic Curve Cryptography , 2015, 2015 International Conference on Computer, Communications, and Control Technology (I4CT).

[5]  Liang Hong,et al.  Secure OLSR , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[6]  Tanapat Ruengsatra,et al.  ETC: Effective trustworthy communication with two-mode authentication for disaster recovery , 2014, 2014 10th International Conference on Information Assurance and Security.

[7]  S. Duraisamy,et al.  A trust system in manet with secure key authentication mechanism , 2012, 2012 International Conference on Recent Trends in Information Technology.

[8]  Tao Zhang,et al.  MPA assisted optimized proactive handoff scheme , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[9]  David Q. Liu,et al.  Extensible authentication protocols for IEEE standards 802.11 and 802.16 , 2008, Mobility '08.

[10]  Hakima Chaouchi,et al.  Light and distributed AAA scheme for mobile ad-hoc networks , 2008 .

[11]  Oivind Kure,et al.  Secure Extension to the OLSR protocol , 2004 .

[12]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[13]  Zhu Xingliang,et al.  A new authentication scheme for Wireless Ad Hoc Network , 2012, 2012 International Conference on Information Management, Innovation Management and Industrial Engineering.

[14]  G.Q. Maguire,et al.  MIPMANET-mobile IP for mobile ad hoc networks , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[15]  Naser Movahhedinia,et al.  Traffic analysis for WiMAX network under DDoS attack , 2010, 2010 Second Pacific-Asia Conference on Circuits, Communications and System.

[16]  Jodie Wetherall,et al.  SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks , 2017, IEEE Transactions on Mobile Computing.

[17]  Thuc Dinh Nguyen,et al.  Attacks on Low Private Exponent RSA: An Experimental Study , 2013, 2013 13th International Conference on Computational Science and Its Applications.

[18]  Hisham Dahshan,et al.  Authenticated symmetric key distribution for mobile ad hoc networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[19]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[20]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[21]  Atul Negi,et al.  Authentication and dynamic key management protocol based on certified tokens for manets , 2009, 2009 Global Mobile Congress.

[22]  Ravilla Dilli,et al.  Implementation of security features in MANETs using SHA-3 standard algorithm , 2016, 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS).

[23]  Abdellah Jamali,et al.  Lightweight authentication-based scheme for AODV in ad-hoc networks , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).

[24]  Mayank Sharma,et al.  Multilevel authentication for resource allotment in MANET , 2014, 2014 Conference on IT in Business, Industry and Government (CSIBIG).

[25]  B. Ramesh,et al.  Design of biometric authentication technique for MANET based emergency response system , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[26]  Yi-Bing Lin,et al.  An efficient identity-based cryptosystem for end-to-end mobile security , 2006, IEEE Transactions on Wireless Communications.

[27]  William A. Arbaugh,et al.  Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.

[28]  N. R. Sunitha,et al.  Secure Ad-Hoc On-demand Distance Vector routing using identity based symmetric key management , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[29]  Georgios Kambourakis,et al.  Attacks and Countermeasures on 802.16: Analysis and Assessment , 2013, IEEE Communications Surveys & Tutorials.

[30]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[31]  Jeong Hyun Yi,et al.  Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs , 2009, IEEE Transactions on Parallel and Distributed Systems.

[32]  M. Ellcy Priana Trust based Clustering and Secure Authentication for Multicast in AD-Hoc Network , 2014 .

[33]  Yanghee Choi,et al.  FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN , 2002 .

[34]  K.A. Nusrath Ali,et al.  MANIPSEC - IPSEC in Mobile Ad-hoc Networks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[35]  Maryline Laurent-Maknavicius,et al.  Authentication protocol runtime evaluation in distributed AAA framework for Mobile Ad-Hoc Networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[36]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[37]  Antonio F. Gómez-Skarmeta,et al.  Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs , 2007, 2007 12th IEEE Symposium on Computers and Communications.

[38]  Hung-Min Sun,et al.  Secure and fast handover scheme based on pre- authentication method for 802.16/WiMAX infrastructure networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[39]  S. Rajaram,et al.  PKMv2 - EAP authentication cost reduction of mobile WiMAX network entry process by the proposed key caching mechanisms , 2012 .

[40]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[41]  Joseph Chee,et al.  Improving Security in the IEEE 802.16 Standards , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[42]  Thuy Ngoc Nguyen,et al.  Enhanced EAP-Based Pre-Authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks , 2012, IEEE Transactions on Wireless Communications.

[43]  Dilli Ravilla,et al.  Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs , 2015, 2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV).

[44]  P. Caballero-Gil,et al.  Authentication and Encryption for a Robotic Ad Hoc Network Using Identity-Based Cryptography , 2018, 2018 4th International Conference on Big Data Innovations and Applications (Innovate-Data).

[45]  Silvio Micali,et al.  How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design , 1986, CRYPTO.