Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


A New Authentication Method for Vertical and Horizontal Handover in 3G-WLAN Interworking Architecture

Younes El Hajjaji El Idrissi, Noureddine Zahid and Mohamed Jedra
Faculty of Science, Laboratory of Conception and System, University Mohammed V-Agdal, Avenue Ibn Batouta, B.P. 1014, Rabat, Morocco
Research Journal of Applied Sciences, Engineering and Technology  2014  2:329-342
http://dx.doi.org/10.19026/rjaset.7.259  |  © The Author(s) 2014
Received: April 12, 2013  |  Accepted: April 22, 2013  |  Published: January 10, 2014

Abstract

The interworking of the 3G and the WLAN technique provides a perfect connectivity solution in terms of data rate, service cost and area coverage. However the Vertical Handover (VH) from the 3G to WLAN and the Horizontal Handover (HH) between WLAN domains present an additional security challenge. The V/H handover must be fast and secure without impacting the security in both networks. Several authentication methods have been proposed to secure the VH and HH. The Extensible Authentication Protocol Key Agreement (EAP-AKA) is the authentication protocol adopted by the 3rd Generation Partnership Project (3GPP) to authenticate User Equipment by the 3G Home Networks. The EAP-AKA protocol suffers from several weaknesses, such as user identity display and high authentication delay. In this study we propose a new simplify authentication method and key agreement for vertical and horizontal handovers based on the existed method EAP-AKA. Performances analysis of the proposed method show superior results in comparison to the existing EAP-AKA method in terms of bandwidth consumption, signaling cost and authentication delay. The security property of the new method is verified by using the formal security analyzer Automated Validation of Internet Security Protocols and Applications (AVISPA) which has a high talent in finding potential attacks automatically in security protocols.

Keywords:

3G-WLAN, authentication, EAP-AKA, ECC, horizontal and vertical handover,


References

  1. Aboba, B., L. Blunk, J. Vollbrecht, J. Carlson and H. Levkowetz, 2004. Extensible Authentication Protocol. RFC 3748.
  2. Arkko, J. and H. Haverinen, 2006. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). IETF, RFC 4187.
  3. Armando, A., D. Basin, J. Cuellar, M. Rusinowitch and L. Viganò€, 2005. The AVISPA tool for the automated validation of internet security protocols and applications. CAV 2005, LNCS 3576, pp: 281-285.
    CrossRef    
  4. Choi, H.H., O. Song and D.H. Cho, 2007. Seamless handoff scheme based on pre-registration and pre-authentication for UMTS-WLAN interworking. Wirel. Pers. Commun., 41(3): 345-364.
    CrossRef    
  5. Glouche, Y. and T. Genet, 2006. SPAN: A Security Protocol Animator for AVISPA-User Manual. IRISA/Rennes university's 1.
    Direct Link
  6. Hankerson, D., A. Menezes and S. Vanstone, 2004. Guide to Elliptic Curve Cryptography. Springer-Verlag, New York, USA.
    PMid:15195329    
  7. Housley, R. and B. Aboba, 2006. Guidance for AAA Key Management. IETF Internet Draft (draft-housley-aaa-key-mgmt-06). (work in Progress), November, 2006.
  8. Hur, J., C. Park and H. Yoon, 2007. An efficient pre-authentication scheme for IEEE 802.11-based vehicular networks. Lect. Notes Comput. Sc., 4752: 121-136.
    CrossRef    
  9. Hwang, H., G. Jung, K. Sohn and S. Park, 2008. A study on man in the middle vulnerability in wireless network using 802.1X and EAP. Proceeding of the International Conference on Information Science and Security. Seoul, Korea, pp: 164-170.
    CrossRef    
  10. Kambourakis, G., A. Rouskas and S. Gritzalis, 2004. Advanced SSL/TLS based authentication for secure WLAN-3G interworking. IEEE Proc. Commun., 151(5): 501-506.
  11. Kwon, H., K.Y. Cheon, K.H. Roh and A. Park, 2006. USIM based authentication test-bed for UMTS-WLAN handover. Proceedings of IEEE Infocom, Barcelona, Spain.
  12. Lee, M., G. Kim and S. Park, 2005. Seamless and secure mobility management with Location-Aware Service (LAS) broker for future mobile interworking networks. J. Commun. Netw., 7(2): 207-221.
    CrossRef    
  13. Li, F., X. Xin and Y. Hu, 2008. Identity-based broadcast signcryption. Comput. Standard Interf., 30: 89-94.
    CrossRef    
  14. Lim, C., D.Y. Kim, O. Song and C.H. Choi, 2009. SHARE: Seamless handover architecture for 3G-WLAN roaming environment. J. Wirel. Netw., 15(3): 353-363.
    CrossRef    
  15. Long, M., C.H. Wu and J.D. Irwin, 2004. Localised authentication for inter-network roaming across wireless LANs. IEEE Proc. Commun., 151(5): 496-500.
    CrossRef    
  16. Matsunaga,Y., A.S. Merino, T. Suzuki and R.H. Katz, 2003. Secure authentication system for public WLAN roaming. Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH). ACM Press, San Diego, CA, USA, pp: 113-121.
    CrossRef    
  17. Pack, S. and Y. Choi, 2002. Pre-authenticated fast handoff in a public wireless LAN based on IEEE 802.1x model. Proceedings of IFIP TC6 Personal Wireless Communications, 234: 175-182.
  18. Prasithsangaree, P. and P. Krishnamurthy, 2004. A new authentication mechanism for loosely coupled 3G-WLAN integrated networks. Proceeding of the IEEE 59th Vehicular Technology Conference. Spring, 5: 2998-3003.
  19. Rigney, C. and S. Willens, 2000. Remote Authentication Dial in User Service (RADIUS). IETF RFC 2865. Retrieved from: tools.ietf.org/html/rfc2865.
    Direct Link
  20. Salgarelli, L., M. Buddhikot, J. Garay, S. Patel and S. Miller, 2003. Efficient authentication and key distribution in wireless IP networks. IEEE Wirel. Commun. Mag., 10(6): 52-61.
    CrossRef    
  21. Shi, M., X. Shen and J.W. Mark, 2004. IEEE802.11 roaming and authentication in wireless LAN/cellular mobile networks. IEEE Wirel. Commun., 11(4): 66-75.
    CrossRef    
  22. 3GPP, 2004. System to Wireless Local Area Network (WLAN) Interworking, System Description. Rel. 6, 3GPP TS 23.234, v6.3.0.
  23. 3GPP, 2005. Security Architecture (Release 7). 3GPP Technical Specifications, 3G Security TS 33.102 v7.0.0, 3GPP, Valbonne, France.
  24. 3GPP, 2006. 3G security WLAN Interworking Security (Release 7). 3GPP Technical Specifications TS 33.234 v7.0.0, 3GPP, Valbonne, France.
  25. 3GPP, 2008. 3G Security: Security Architecture (Release 8). TS 33.102 v8.0.0, June 2008.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved