GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks

  • Authors:
  • Anmin Fu;Gongxuan Zhang;Yuqing Zhang;Zhenchao Zhu

  • Affiliations:
  • School of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing, China 210094;School of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing, China 210094;National Computer Network Intrusion Protection Center, GUCAS, Beijing, China 100049;Information Security Research Center, Southeast University, Nanjing, China 210096

  • Venue:
  • Wireless Personal Communications: An International Journal
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

IEEE 802.16m is now under consideration by the International Telecommunication Union (ITU) to become the International Mobile Telecommunications (IMT)-Advanced standard. However, handover authentication is a critical issue in this area. In this paper, we propose an efficient group-based handover authentication mechanism, named as GHAP, for correlated mobile stations (MSs) in IEEE 802.16m networks. In our scheme, the correlated MSs who have the similar Signal to Interference-plus-Noise Ratio and history handover information etc. are divided into the same handover group. When the first MS of the handover group members moves from the service base station (BS) to a target BS, the service BS transmits all the handover group members' security context to the target BS utilizing the security context transfer (SCT) method and then all these MSs in the same handover group can easily perform the handover authentication with the target BS. Different from the conventional SCT schemes, our scheme uses the MSs' security context as a symmetric key of Cipher-based message authentication code (CMAC) but not the key material of deriving new session key. Therefore, the proposed scheme can effectively resist the domino effect existing in the previous SCT schemes. Moreover, security analysis shows that the proposed scheme also meets the other security requirements in handover authentication semantics. Furthermore, performance analysis demonstrates that the proposed scheme is very efficient in reducing average handover latency.