Kangsuk Chae, Jiman Mun, Souhwan Jung
(School of Electronic Engineering, Soongsil University, Seoul 156-743, Korea)
Abstract:A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access. In addition, a specific protocol distributing a hierarchical key after the proactive authentication from key holder to base station has been proposed. The proposed hybrid authentication framework not only performs proactive authentication with credentials based on Chameleon hashing, which removes the authentication procedures that exchanges messages with a authentication server, but also performs re-authentication with EAP re-authentication protocol(ERP) that distributes the hierarchical key on the basis of the root key generated by the proactive authentication.
Key words:hybrid authentication; vertical handover; media independent handover(MIH); chameleon hashing; extensible authentication protocol(EAP); EAP re-authentication protocol(ERP)
CLD number: TN926 Document code: A
Article ID: 1674-8042(2012)04-0362-08 doi: 10.3969/j.issn.1674-8042.2012.04.013
References
[1] IEEE Std 802.21-2008. Media independent handover services, January 2009.
[2] IEEE 802.21a, Proactive authentication and MIH security. [2012-07-10]. https://mentor.ieee.org/802.21/documents.
[3] Aboba B, Blunk L, Vollbrecht J, et al. Extensible authentication protocol (EAP), IETF RFC 3748, 2004.
[4] IEEE Std 802.11i-2004, Medium access control (MAC) security enhancements, 2004.
[5] Eum S, Choi H. EAP-Kerberos II: An adaptation of kerberos to EAP for mutual authentication. Proc. of ITST 2008, Phuket, Thailand, 2008.
[6] Narayanan V, Dondeti L. EAP extensions for EAP re-authentication protocol (ERP). IETF RFC 5296, 2008.
[7] Salowey J, Dondeti L, Narayanan V, et al. Specification for the drivation of root keys from an extended master session key (EMSK). IETF RFC 5295, 2008.
[8] Sun H, Lin Y, Chen S, Shen Y. Secure and fast handover scheme based on pre-authentication method for 802.16 / WiMAX infrastructure networks. Proc. of TENCON 2007, Taipei, Taiwan, 2007.
[9] Choi J, Jung S. A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters, 2010, 14(1): 54-56.
[10] Krawczyk H, Rabin T. Chameleon signatures. Proc. of NDSS 2000, San Diego, California, USA, 2000: 143-154.
[11] Diffie W, Hellman M. New directions in cryptograhpy. IEEE Trans. on Information Theory, 1976, 22(6): 644-654.
[12] Rescorla E. Diffie-Hellman key agreement method. IETF RFC 2631, 1999.