Secure three-party key distribution protocol for fast network access in EAP-based wireless networks

被引:5
|
作者
Marin-Lopez, R. [1 ]
Pereniguez, F. [1 ]
Bernal, F. [1 ]
Gomez, A. F. [1 ]
机构
[1] Univ Murcia, Fac Informat, Dept Informat & Commun Engn DIIC, E-30001 Murcia, Spain
关键词
EAP; Fast re-authentication; Fast handoff; Key distribution; Network security; FAST HANDOVER; AUTHENTICATION; AAA;
D O I
10.1016/j.comnet.2010.04.014
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a solution that reduces the time spent on providing network access in multi-domain mobile networks where the authentication process is based on the Extensible Authentication Protocol (EAP). The goal is to achieve fast and smooth handoffs by reducing the latency added by the authentication process. This process is typically required when a mobile user moves from one authenticator to another regardless of whether the new authenticator is in the same domain (intra-domain) or different domain (inter-domain). To achieve an efficient solution to this problem, it has been generally recognized that a fast and secure key distribution process is required. We propose a new fast re-authentication architecture that employs a secure three-party key distribution protocol which reduces the number of message exchanges during the network access control process. Our approach is proved to preserve security and verified by means of a formal tool. The resulting performance benefits are shown through our extensive simulations. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:2651 / 2673
页数:23
相关论文
共 50 条
  • [1] Secure protocol for fast authentication in EAP-Based wireless networks
    Marin, Rafa
    Zapata, Santiago
    Gomez, Antonio F.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1038 - 1051
  • [2] 3-party approach for fast handover in EAP-based wireless networks
    Marin, Rafa
    Fernandez, Pedro J.
    Gomez, Antonio F.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPIS, DOA, ODBASE, GADA, AND IS, PT 2, PROCEEDINGS, 2007, 4804 : 1734 - 1751
  • [3] A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks
    Sinha, Vivek Kumar
    Anand, Divya
    Alharithi, Fahd S.
    Almulihi, Ahmed H.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 6293 - 6305
  • [4] A Secure Three-Party Authentication Protocol for Wireless Body Area Networks
    Vishwakarma, Rahul
    Mohapatra, Ramesh Kumar
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 99 - 103
  • [5] Verifiable three-party secure key exchange protocol based on eigenvalue
    Zhang Y.
    Wang Z.
    Wang Z.
    Chen H.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (12): : 149 - 154
  • [6] An Efficient Three-Party Authentication Key Exchange Protocol for Wireless Sensor Networks
    Li, Hongtu
    Hu, Liang
    Chu, Jianfeng
    Chi, Ling
    Li, Hongwei
    SENSOR LETTERS, 2013, 11 (05) : 990 - 996
  • [7] A new secure three-party authenticated key exchange protocol
    Xi'an Communications Institute, Xi'an 710106, Shannxi, China
    Int. Rev. Comput. Softw., 7 (3633-3638):
  • [8] Three-party secure authenticated key agreement protocol based on identity sign
    Li, Ning
    Yeap, Tet
    Yu, Chong xiu
    IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 103 - 105
  • [9] A secure and efficient three-party password-based authenticated key exchange protocol
    He, Yong-Zhong
    Cai, Ying
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 280 - +
  • [10] Provably secure three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    INFORMATION SCIENCES, 2012, 184 (01) : 310 - 323