Kerberos based authentication for inter-domain roaming in wireless heterogeneous network

  • Authors:
  • Anish Prasad Shrestha;Dong-You Choi;Goo Rak Kwon;Seung-Jo Han

  • Affiliations:
  • Department of Information and Communication Engineering, Chosun University, Gwangju, Republic of Korea11375 Seosuk-dong, Dong-gu, Gwangju, 501-759, Republic of Korea.;Department of Information and Communication Engineering, Chosun University, Gwangju, Republic of Korea11375 Seosuk-dong, Dong-gu, Gwangju, 501-759, Republic of Korea.;Department of Information and Communication Engineering, Chosun University, Gwangju, Republic of Korea11375 Seosuk-dong, Dong-gu, Gwangju, 501-759, Republic of Korea.;Department of Information and Communication Engineering, Chosun University, Gwangju, Republic of Korea11375 Seosuk-dong, Dong-gu, Gwangju, 501-759, Republic of Korea.

  • Venue:
  • Computers & Mathematics with Applications
  • Year:
  • 2010

Quantified Score

Hi-index 0.09

Visualization

Abstract

An increased demand in ubiquitous high speed wireless access has led integration of different wireless technologies provided by different administrative domains creating truly a heterogeneous network. Security is one of the major hurdles in such network environment. As a mobile station moves in and out of the coverage area of one wireless network to another, it needs to be authenticated. The existing protocols for authentication of a mobile station are typically centralized, where the home network participates in each authentication process. It requires home network to maintain roaming agreement with all other visiting networks. Moreover, the round trip time to home network results high latency. This paper is focused on developing authentication protocol for wireless network irrespective of the technologies or the administrative domain. We propose a secure protocol which adopts strong features of Kerberos based on tickets for rigorous mutual authentication and session key establishment along with issuance of token so that the mobile station can have access to not only the roaming partner of home network but also to the roaming partner of previous visited networks. The performance evaluation and comparative analysis of the proposed protocol is carried out with the already implemented standard protocols and most remarkable research works till date to confirm the solidity of the results presented.