++
. (2)
++=−=Δ PAAAPAPMN TTTTT __333 24'
procAPprocPAAprocMN TTT ___ 72 −++
. (3)
The time difference (Eq.3) shows that, in
comparison with PANA authentication, the proposed
authentication gains the time taken by the PAA
Discovery phase and loses the time taken by AP
message processing, which is relatively small.
4 CONCLUSIONS AND FUTURE
WORK
Parallel authentication permits a mobile user to
obtain Internet access as a result of a single
authentication in a multi-service network. The
proposed approach combines the operation of the
two most commonly used protocols to authenticate a
user to a network and a service and provide strong
link-layer encryption for communications. An AR is
a good candidate for the role of authenticator
because this scheme may serve for pre-
authentication using context transfer between
different administrative domains.
The proposed approach does not allow
communication between an unauthenticated MN and
internal network entities. It aims to protect the
DHCP server and access router from untraceable
DoS attacks. The performance of the process may be
improved due to the exclusion of PAA discovery
and handshake phase from authentication and double
IP address acquisition. The security level is not
compromised; all communications inside the
network are secured.
The paper does not take into account a time
interval taken by searching for and communicating
with an MN’s home authentication server, as it
concentrates on local authentication and
improvement of security of network access.
The handover process still takes a long time and
does not allow real-time applications to run without
soft handover support. It may be possible to reduce
the overall latency by using pre-authentication
between administrative domains.
REFERENCES
McCann, S., Hancoc, R., Hepworth, E. (2004). Novel
WLAN Hotspot authentication [Electronic version].
3G Mobile Communication Technologies, 59-63.
Jaanus (2006, February, 5). Skype invests in FON to
increase Wi-Fi availability. Retrieved March, 2006,
from http://share.skype.com/sites/en/news_events_milestones
The Chicago Tribune. It's a Wi-Fi kind of town (2006,
February, 17). Retrieved February 18, 2006.
IEEE Computer Society. IEEE 802.11i Standard (23 July
2003).
IEEE Computer Society, IEEE 802.11F Standard (14 July
2003).
Parthasarathy, M. (March 2005). Protocol for Carrying
Authentication and Network access (PANA) Threats
Analysis and Security requirements. RFC 4016.
Retrieved from www.ietf.org
Forsberd, D., Ohba, Y., Patil, B., Tschofenig, H., Yegin,
A. (July 2005). Protocol for Carrying Authentication
and Network access (PANA). draft-ietf-pana-pana-10.
Retrieved from www.ietf.org.
Patil, B., Tschofenig, H., Yegin, A. (2005, October, 21)
PANA mobility optimizations. draft-ietf-pana-
mobopts-01. Retrieved from www.ietf.org.
Aboba, B., Simon, D. (October 1999). PPP EAP-TLS
Authentication Protocol. RFC 2716. Retrieved from
www.ietf.org.
Bargh, M.S., Hulsebosch, R.J., Eertink, E.H., Prasad, A.,
Wang, H., Schoo, P. (2004, October, 1). Fast
authentication Methods for handovers between IEEE
802.11 Wireless LANs. WMASH’04. The ACM
Digital Library.
Kassab, M., Belghith, A., Bonnin, J.-M., Sassi, S. (2005,
October, 13). Fast Pre-Authentication Based on
Proactive Key Distribution for 802.11 Infrastructure
Networks. WMuNeP’05. The ACM Digital Library.
Loughney, J., Nakhjiri, Ed.M., Perkins, C., Koodli, R.
(July 2005). Context Transfer Protocol (CXTP). RFC
4067. Retrieved from www.ietf.org
Aboba, B., Beadles, M.(January 1999). The Network
Access Identifier. RFC 2486. Retrieved from
www.ietf.org
Rigney, C., Willens, S., Rubens, A., Simpson, W. (June
2000). Remote Authentication Dial In User Service
(RADIUS). RFC 2865. Retrieved from www.ietf.org.
Das, S., Patil, B., Soliman, H., Yegin, A. (2003, April, 28).
Problem Statement and Usage Scenarios for PANA.
draft-ietf-pana-usage-scenarios-06.txt. Retrieved from
www.ietf.org
Matsunaga, Y., Merino, A.S., Suzuki, T., Katz, R.H.
(September 2003). Secure Authentication System for
Public WLAN Roaming. WMASH’03. Retriewed from
http:\\berkeley.edu/paper
WINSYS 2006 - INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS
330