Use of Elliptic Curves in Cryptography
CRYPTO '85 Advances in Cryptology
An empirical analysis of the IEEE 802.11 MAC layer handoff process
ACM SIGCOMM Computer Communication Review
Location Management of Correlated Mobile Users in the UMTS
IEEE Transactions on Mobile Computing
Kerberized handover keying: a media-independent handover key management architecture
Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture
Performance Analysis of Group Handover Scheme for IEEE 802.16j-Enabled Vehicular Networks
APWeb/WAIM '09 Proceedings of the Joint International Conferences on Advances in Data and Web Management
Wireless Communications & Mobile Computing
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
Analysis of Handover Key Management schemes under IETF perspective
Computer Standards & Interfaces
Capauth: a capability-based handover scheme
INFOCOM'10 Proceedings of the 29th conference on Information communications
A fast handover authentication mechanism based on ticket for IEEE 802.16m
IEEE Communications Letters
Lightweight and provably secure user authentication with anonymity for the global mobility network
International Journal of Communication Systems
Fast re-authentication for handovers in wireless communication networks
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
A simple and robust handover authentication between HeNB and eNB in LTE networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks
IEEE Wireless Communications
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
IEEE Transactions on Wireless Communications
On the security of public key protocols
IEEE Transactions on Information Theory
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
IEEE 802.16m is now under consideration by the International Telecommunication Union (ITU) to become the International Mobile Telecommunications (IMT)-Advanced standard. However, handover authentication is a critical issue in this area. In this paper, we propose an efficient group-based handover authentication mechanism, named as GHAP, for correlated mobile stations (MSs) in IEEE 802.16m networks. In our scheme, the correlated MSs who have the similar Signal to Interference-plus-Noise Ratio and history handover information etc. are divided into the same handover group. When the first MS of the handover group members moves from the service base station (BS) to a target BS, the service BS transmits all the handover group members' security context to the target BS utilizing the security context transfer (SCT) method and then all these MSs in the same handover group can easily perform the handover authentication with the target BS. Different from the conventional SCT schemes, our scheme uses the MSs' security context as a symmetric key of Cipher-based message authentication code (CMAC) but not the key material of deriving new session key. Therefore, the proposed scheme can effectively resist the domino effect existing in the previous SCT schemes. Moreover, security analysis shows that the proposed scheme also meets the other security requirements in handover authentication semantics. Furthermore, performance analysis demonstrates that the proposed scheme is very efficient in reducing average handover latency.