Low Latency of Re-authentication during Handover - Re-authentication using a Signed Token in Heterogeneous Wireless Access Networks
Hassane Aissaoui, Pascal Urien, Guy Pujolle
2013
Abstract
Wireless networks provide several advantages over wired networks. They offer: a satisfactory bandwidth, mobility, easy deployment in difficult areas, long-term savings and the speed more and more higher. However, they also have some disadvantages in regard to security, performances during re-authentication, execution of real-time applications and interference from other electromagnetic sources (Bluetooth, microwave, etc.). The existing solutions to reduce delays of Handover intercellular are specific solutions to a particular network or manufacturer of this technology. The main objective of this paper is to propose novel mechanisms based on digital signatures to obtain low latency re-authentication during Handover in Wireless Access Networks. Our infrastructure will be based on trusted relationship between the heterogeneous access points and the authentication servers, in order to allow the mobility anytime anywhere to any user, and the ubiquitous access to the Future Internet, while ensuring the right level of security to both the end users as well to the wireless networks. In this context, the main issues are to resolve the seamless Handover and the re-authentication during mobility of station. By using a signed token in our trusted infrastructure, we achieve a unique authentication and a fast re-authentication. Therefore, the requests to the authentication server are considerably limited.
References
- Bangolae, S., Bell, C. & Qi, E., 2006, 'Performance study of fast BSS transition using IEEE 802.11r', IWCMC 7806 Proceedings of the 2006 international conference on Wireless communications and mobile computing pp. 737-742, 2006.
- Da Conceicão, A. F., Li, J., Florêncioy, D. A., & Kon, F., 2006, 'Is IEEE 802.11 ready for VoIP?78, Department of Computer Science, Institute of Mathematics and Statistics, University of Sào Paulo, Communication and Collaboration Systems, Microsoft Research.
- Menezes, A. J., Van Oorschot, P. C., &Vanstone, S. A., 2001, 'Handbook of Applied Cryptography', Chapter 11, CRC Press, Fifth Printing August 2001, freely available at <http://cacr.uwaterloo.ca/hac/>.
- Mishra, A., Shin, M. & Arbaugh, W., 2003, 'An empirical analysis of the IEEE 802.11 mac layer handoff process' SIGCOMM Comput. Commun. Rev., vol. 33, no. 2, pp. 93-102, 2003.
- Velayos, H., & Karlsson, G., 2004, 'Techniques to reduce the IEEE 802.11b handoff time' Tech. Rep., 20-24 June 2004.
- Zrelli, S. & Shinoda, Y., 2007, 'Experimental evaluation of EAP performance in roaming scenarios', AINTEC 7807 Proceedings of the 3rd Asian conference on Internet Engineering: Sustainable Internet, pp. 86-98, 2007.
- AAA Authorization Framework, 2000, IETF RFC 2904, August 2000, <http://tools.ietf.org/html/rfc2904>.
- EAP, 2004, 'Extensible Authentication Protocol', IETF RFC 3748, <http://tools.ietf.org/html/rfc3748>, Jun. 2004.
- IAPP, 2003, IEEE std 802.11F-2003, 'IEEE Trial-Use Recommended Practice for Multi Vendor Access Point Interoperability Via an Inter Access Point Protocol (IAPP) Across Distribution Systems Supporting IEEE 802.11 Operation'.
- IEEE 802.1X, 2001, IEEE Std 802.1X, 'Standards for Local and Metropolitan Area Networks: Port Based Access Control', June 14, 2001.
- ISO 7498-2, 1989, 'Information processing systems -- Open Systems Interconnection--Basic Reference Model' Part 2: Security Architecture.
- RADIUS, 2000, 'Remote Authentication Dial In User Service', IETF Std RADIUS RFC 2865, June 2000, <http://tools.ietf.org/html/rfc2865>.
- RFC 2548, 1999, IETF RFC 2548, March 1999, 'Microsoft Vendor-Specific RADIUS Attributes', <https://tools.ietf.org/html/rfc2548>.
- RFC 3078, 2001, IETF RFC 3078, March 2001, 'Microsoft Point-To-Point Encryption (MPPE) Protocol', <http://www.ietf.org/rfc/rfc3078.txt>.
- WLAN, 1997, IEEE std 802.11, 'WIRELESS LOCAL AREA NETWORKS', The Working Group for WLAN Standards, <http://www.ieee802.org/11/>.
Paper Citation
in Harvard Style
Aissaoui H., Urien P. and Pujolle G. (2013). Low Latency of Re-authentication during Handover - Re-authentication using a Signed Token in Heterogeneous Wireless Access Networks . In Proceedings of the 10th International Conference on Signal Processing and Multimedia Applications and 10th International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2013) ISBN 978-989-8565-74-7, pages 248-254. DOI: 10.5220/0004608602480254
in Bibtex Style
@conference{winsys13,
author={Hassane Aissaoui and Pascal Urien and Guy Pujolle},
title={Low Latency of Re-authentication during Handover - Re-authentication using a Signed Token in Heterogeneous Wireless Access Networks},
booktitle={Proceedings of the 10th International Conference on Signal Processing and Multimedia Applications and 10th International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2013)},
year={2013},
pages={248-254},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004608602480254},
isbn={978-989-8565-74-7},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 10th International Conference on Signal Processing and Multimedia Applications and 10th International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2013)
TI - Low Latency of Re-authentication during Handover - Re-authentication using a Signed Token in Heterogeneous Wireless Access Networks
SN - 978-989-8565-74-7
AU - Aissaoui H.
AU - Urien P.
AU - Pujolle G.
PY - 2013
SP - 248
EP - 254
DO - 10.5220/0004608602480254