A Fast Authentication Scheme for WiMAX-WLAN Vertical Handover

被引:13
|
作者
Huang, Kuei-Li [1 ]
Chi, Kuang-Hui [3 ]
Wang, Jui-Tang [2 ]
Tseng, Chien-Chao [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu, Taiwan
[2] Ind Technol Res Inst, Informat & Commun Labs, Hsinchu, Taiwan
[3] Natl Yunlin Univ Sci & Technol, Dept Elect Engn, Touliu, Taiwan
关键词
Vertical handover; Fast handover; Authentication; WiMAX; WiFi;
D O I
10.1007/s11277-012-0828-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In view that authentication has made a significant determinant in handover delay, this paper presents a fast authentication mechanism for mobile stations roaming within a WiMAX-WLAN interconnected environment. Incorporating a key reuse design that prevents repeated transactions at a remote server, our mechanism distributes security contexts ahead of handover to a local trusted key holder which manages several sites. A target site, upon receiving a mobile station, retrieves the contexts locally for authentication purpose and thus completes handover efficiently. While employing a target prediction algorithm as an option, our mechanism distributes the contexts to target candidates as dictated, which further improves handover performance if target prediction hits and maintains its advantage even in a miss. In addition, the handover optimization design specified in WiMAX is extended to support WiFi-to-WiMAX handovers. We reason that the proposed mechanism does not compromise the system in any sense as well. Analytical and simulation results show that, despite key pre-distribution misses, our mechanism leads to marked improvement over counterpart schemes in terms of handover delay and packet loss, meeting delay-sensitive application requirements.
引用
收藏
页码:555 / 575
页数:21
相关论文
共 50 条
  • [1] A Fast Authentication Scheme for WiMAX–WLAN Vertical Handover
    Kuei-Li Huang
    Kuang-Hui Chi
    Jui-Tang Wang
    Chien-Chao Tseng
    [J]. Wireless Personal Communications, 2013, 71 : 555 - 575
  • [2] WiMAX-WLAN Vehicle-to-Infrastructure Network Architecture During Fast Handover Process
    Charitos, Michael
    Kalivas, Grigorios
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 431 - 436
  • [3] Fast Vertical Handover utilizing Sleep mode in WLAN and WiMAX Heterogeneous Networks
    Jang, Kyeyoon
    Shin, Bongjhin
    Hong, Daehyoung
    [J]. 2008 14TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS, (APCC), VOLS 1 AND 2, 2008, : 844 - 848
  • [4] A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks
    Fu, Anmin
    Zhang, Gongxuan
    Yu, Yan
    Zhu, Zhenchao
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (09): : 3250 - 3265
  • [5] A Fast Handover Scheme for Wimax System
    Li, Xujie
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [6] Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks
    Anmin Fu
    Gongxuan Zhang
    Zhenchao Zhu
    Yuqing Zhang
    [J]. Wireless Personal Communications, 2014, 79 : 1277 - 1299
  • [7] Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks
    Fu, Anmin
    Zhang, Gongxuan
    Zhu, Zhenchao
    Zhang, Yuqing
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (02) : 1277 - 1299
  • [8] Vertical Handover Triggering Between WLAN and WIMAX Using Sip
    Vijayshree, J. C.
    Palanivelu, T. G.
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 769 - 774
  • [9] A Novel Vehicle to Grid Load Management Scheme Based on WiMAX-WLAN in Smart Grids
    Nafi, Nazmus S.
    Ahmed, Khandakar
    Gregory, Mark A.
    [J]. 2015 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2015, : 2149 - 2154
  • [10] Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers
    Al Shidhani, Ali
    Leung, Victor C. M.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) : 699 - 713