Secure three-party key distribution protocol for fast network access in EAP-based wireless networks

被引:5
|
作者
Marin-Lopez, R. [1 ]
Pereniguez, F. [1 ]
Bernal, F. [1 ]
Gomez, A. F. [1 ]
机构
[1] Univ Murcia, Fac Informat, Dept Informat & Commun Engn DIIC, E-30001 Murcia, Spain
关键词
EAP; Fast re-authentication; Fast handoff; Key distribution; Network security; FAST HANDOVER; AUTHENTICATION; AAA;
D O I
10.1016/j.comnet.2010.04.014
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a solution that reduces the time spent on providing network access in multi-domain mobile networks where the authentication process is based on the Extensible Authentication Protocol (EAP). The goal is to achieve fast and smooth handoffs by reducing the latency added by the authentication process. This process is typically required when a mobile user moves from one authenticator to another regardless of whether the new authenticator is in the same domain (intra-domain) or different domain (inter-domain). To achieve an efficient solution to this problem, it has been generally recognized that a fast and secure key distribution process is required. We propose a new fast re-authentication architecture that employs a secure three-party key distribution protocol which reduces the number of message exchanges during the network access control process. Our approach is proved to preserve security and verified by means of a formal tool. The resulting performance benefits are shown through our extensive simulations. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:2651 / 2673
页数:23
相关论文
共 50 条
  • [21] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho CHOU
    Kuo-yu TSAI
    Tzong-chen WU
    Kuo-hui YEH
    JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2013, 14 (05) : 347 - 355
  • [22] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho Chou
    Kuo-yu Tsai
    Tzong-chen Wu
    Kuo-hui Yeh
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 347 - 355
  • [23] Provably Secure Password-based Three-party Key Exchange Protocol with Computation Efficiency
    Fu, Jih-Ming
    Lin, Jeng-Ping
    Wang, Ren-Chiun
    LIFE SCIENCE JOURNAL-ACTA ZHENGZHOU UNIVERSITY OVERSEAS EDITION, 2011, 8 (04): : 394 - 401
  • [24] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chou, Chih-ho
    Tsai, Kuo-yu
    Wu, Tzong-chen
    Yeh, Kuo-hui
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (05): : 347 - 355
  • [25] Comment on “A practical protocol for three-party authenticated quantum key distribution”
    Yi-Ping Luo
    Wen-Han Chou
    Tzonelih Hwang
    Quantum Information Processing, 2017, 16
  • [26] Three-party reference frame independent quantum key distribution protocol
    Comfort Sekga
    Mhlambululi Mafu
    Chinese Physics B, 2021, 30 (12) : 61 - 71
  • [27] Comment on "A practical protocol for three-party authenticated quantum key distribution"
    Luo, Yi-Ping
    Chou, Wen-Han
    Hwang, Tzonelih
    QUANTUM INFORMATION PROCESSING, 2017, 16 (05)
  • [28] Three-party reference frame independent quantum key distribution protocol*
    Sekga, Comfort
    Mafu, Mhlambululi
    CHINESE PHYSICS B, 2021, 30 (12)
  • [29] On session identifiers in provably secure protocols - The Bellare-Rogaway three-party key distribution protocol revisited
    Choo, KKR
    Boyd, C
    Hitchcock, Y
    Maitland, G
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 351 - 366
  • [30] A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 1 - 11