ACM Transactions on Computer Systems (TOCS)
Channel Occupancy Times and Handoff Rate for Mobile Computing and PCS Networks
IEEE Transactions on Computers
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
Recursive protocol for group-oriented authentication with key distribution
Journal of Systems and Software
A cooperative diversity based handoff management scheme
IEEE Transactions on Wireless Communications
A communication-efficient three-party password authenticated key exchange protocol
Information Sciences: an International Journal
A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cost analysis of IP mobility management protocols for consumer mobile devices
IEEE Transactions on Consumer Electronics
A fast iterative localized re-authentication protocol for heterogeneous mobile networks
IEEE Transactions on Consumer Electronics
Information Sciences: an International Journal
Journal of Network and Computer Applications
Hi-index | 0.07 |
Proxy Mobile IPv6 (PMIPv6), a network-based mobility management protocol, has clearly different perceptions compared with host-based mobility management protocols. In PMIPv6, a mobile node (MN) is not involved in any mobility signaling as mobility service provisioning entities provide mobility services for the MN. This characteristic leads us to develop a new handover authentication scheme that satisfies certain security and performance requirements. In this paper, handover optimized ticket-based authentication (HOTA) is developed to enable an MN to securely reuse a credential issued by an authentication server (AS) when the MN performs handover authentication over different access networks. The proposed secure reuse of the credential reduces the handover latency while it simplifies a handover authentication procedure. Initial authentication and handover authentication procedures of HOTA are presented in detail and analyzed with a formal authentication analysis method, BAN Logic. Analytical models are also developed to evaluate the authentication and handover latencies, packet loss, and handover failure probability. The conducted numerical analysis corroborates that HOTA outperforms previously developed handover authentication schemes for PMIPv6.