Enhanced EAP-Based Pre-Authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks

Mobile WiMAX is yet to meet the expectation from mobile users to provide secured and seamless services. Long delay in the time-consuming authentication procedure is a well-known bottleneck of the IEEE 802.16e handover scheme, causing service disruption when a mobile user moves between base stations. A pre-authentication-based handover scheme for mobile WiMAX networks aims to achieve fast and secure inter-ASN handovers. However, it is shown to be vulnerable to Denial of Service (DoS) and replay attacks. In this paper, we propose an Enhanced EAP-based pre-authentication (EEP) scheme to overcome the vulnerability of the above-mentioned scheme with much less requirements on the computation and communication resources.

[1]  Glen Zorn RADIUS Attributes for IEEE 802.16 Privacy Key Management Version 1 (PKMv1) Protocol Support , 2010, RFC.

[2]  Gerard J. Holzmann,et al.  The Model Checker SPIN , 1997, IEEE Trans. Software Eng..

[3]  Hung-Min Sun,et al.  Secure and fast handover scheme based on pre- authentication method for 802.16/WiMAX infrastructure networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[4]  Riccardo Sisto,et al.  Using SPIN to Verify Security Properties of Cryptographic Protocols , 2002, SPIN.

[5]  Tai-Myung Chung,et al.  Secure handover for Proxy Mobile IPv6 in next-generation communications: scenarios and performance , 2011, Wirel. Commun. Mob. Comput..

[6]  Michael Roe,et al.  Reducing Reauthentication Delay in Wireless Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[7]  Amr T. Abdel-Hamid,et al.  Formal analysis of the handover schemes in mobile WiMAX networks , 2009, 2009 IFIP International Conference on Wireless and Optical Communications Networks.

[8]  Mohammad Ilyas,et al.  WiMAX: Standards and Security , 2007 .

[9]  Hamid Sharif,et al.  Performance Analysis of IEEE 802.16e Handover with RSA-Based Authentication , 2010, 2010 IEEE International Conference on Communications.

[10]  David Q. Liu,et al.  Extensible authentication protocols for IEEE standards 802.11 and 802.16 , 2008, Mobility '08.

[11]  Saewoong Bahk,et al.  Enhancing Security Using the Discarded Security Information in Mobile WiMAX Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[12]  A. Joesang Security Protocol Verification Using SPIN , 1995 .