• Title/Summary/Keyword: 핸드오버 보안

Search Result 41, Processing Time 0.036 seconds

Handover Authentication Protocol in VANET Supporting the Fast Mobility (빠른 이동성을 지원하는 VANET 환경의 핸드오버 인증 프로토콜)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.5
    • /
    • pp.30-39
    • /
    • 2008
  • This paper proposes a secure and efficient handover authentication protocol in VANET supporting fast mobility. Although the existing schemes commonly use the hash function or XOR operation to be suitable for a light-weight mobile, it does not support the security feature such as PBS. To solve this security problem, another protocol utilizing the CGA technology is proposed but it is vulnerable to the DoS attack due to a number of exponent operations. The proposed protocol using a light-weight Diffie-Hellman provides security features and performs a reduced number of exponential operation at the MN than the existing scheme.

Optimal Handover Key Refresh Interval in 3GPP LTE/SAE Network (3GPP LTE/SAE 네트워크에서의 핸드오버 키 최적 갱신주기에 관한 연구)

  • Han, Chan-Kyu;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.237-242
    • /
    • 2011
  • LTE/SAE has presented the handover key management to revoke the compromised keys and to isolate corrupted network devices. In this paper, we identify that the handover key management is vulnerable to so-called de-synchronization attacks, which is jeopardizing the forward secrecy of handover key management. We place an emphasis on periodic root key update to minimize the effect of the de-synchronization attacks. An optimal value for the root key update interval is suggested in order to minimize signaling load and ensure security of user traffic.

A Handover Mechanism for Authenticate Subscriber between inter-network in Mobile WiMAX Environment (Mobile WiMAX 환경에서 인터 네트워크간 가입자를 인증하기 위한 핸드오버 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Kim, Jae-Hong;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.181-188
    • /
    • 2008
  • Nowadays, WiMAX which provides internet service with a middle and low speed serves more function and is wider than Wi-Fi. While they solve the security risks as subscribers do handover by subscriber's re-certification procedure as the Network range is getting wider, there are more security problems making the problems of electric-power consumption and delay. This paper suggests a handover mechanism which simplify the subscriber's re-certification procedure and prevents a security problem as doing handover for solving the problem of delay and the rate of processing. The mechanism can cooperate with PKI structure to increase flexibility and security and minimize network re-entry procedure or re-certification procedure by providing continual service. As a result. the mechanism's throughput as the number of subscribers is lower than IEEE 802.16e and the mechanism proves that it is secure from the attack of man-in-the-middle and reply as doing handover.

  • PDF

VANET에서 CPU 성능을 보장하는 핸드오버 인증프로토콜

  • Cho, Shin-Young;Kim, Seung-Hwan;Lim, Hun-Jung;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.664-667
    • /
    • 2010
  • VANET에서 빠른 핸드오버를 위한 Fast MIPv6를 사용하는데 있어 Mobile Node이 다음 Access Router로 이동함에 따라 새로운 주소를 생성하고 이전주소를 새로운 주소로 교환하는 과정인 Fast Binding Update가 안전하게 수행하기 위해 핸드오버 인증 프로토콜이 사용된다. 본 논문에서는 핸드오버 인증 프로토콜 중 Kempf가 제안한 SEND기반의 핸드오버 인증 프로토콜이 Sybil 공격 및 DoS 공격에 보안상 취약하므로 생기는 CPU 성능 저하 문제를 인증과정을 수행하기 전에 Access Router의 주소 리스트를 사용하여 완화시키는 방법을 제안한다. 그로 인해 CPU 성능의 효율성을 보장하도록 한다.

Secure Handover Scheme for PMIPv6 (PMIPv6에서의 안전한 핸드오버 기법)

  • Na, Sang-Ho;Shin, Young-Rok;huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.691-692
    • /
    • 2009
  • 노드의 이동성을 지원하는 Mobile IPv6에서는 단말과 홈 에이전트 간 시그널링 처리로 인한 부하를 줄이기 위해 Proxy Mobile IPv6가 제안되었다. 그러나, Proxy Mobile IPv6 역시 서브넷 이동에 따른 재인증 프로세스로 인해 지연이 발생하며 현재까지 Mobile IPv6와는 달리 보안 취약점에 대한 분석과 그에 맞는 보안 기법이 미비한 상황이다. 본 논문에서는 현재까지의 Proxy Mobile IPv6에 대한 보안 취약점 분석을 통해 안전한 핸드오버 기법을 제안한다.

Authentication Interworking Protocol based on Media Independent Handover in Heterogeneous Networks (MIH 기반의 이기종 네트워크 환경에서 대리 서명을 이용한 인증 연동 프로토콜)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.86-94
    • /
    • 2010
  • This paper proposed an authentication interworking protocol (AIP) based on IEEE 802.21 MIH in the heterogeneous networks. The proposed AIP using the RSA signature reduces handover delay time and communication message overhead when the mobile node moves between the heterogeneous networks. It defines new AIP TLV in MIH frame format and uses the MIH Information Server (MIHIS) for proxy signature issue instead of the authentication server for the heterogeneous networks. For low handover delay, the proposed AIP performs pre-authentication processes with MIH protocol before layer 2 handover. Also, this paper analyzed the performance of the handover and compared with the non-secure MIH protocol.

A Handover Scheme based on Partial Encrypton Method to Support Security and Rapidity of Mobile WiMAX (Mobile WiMAX에서 부분암호화 방식을 적용한 안전하고 신속한 핸드오버 기법)

  • Kim, Ki-Su;Kim, Yon-Cheol;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.67-73
    • /
    • 2011
  • Handover in high speed mobile communication service, in particulary mobile WiMAX is supported efficiency mobility to 120km/h speed. But, in order to accommodate number of user increment in a cell, wireless network is increment to microcell and picocell by allocate bandwidth and by decrease cell size. handover is occurrent and increment connection failure ratio In this result. IEEE 802.16 standard is support seamless connection through handover optimization scheme. But because authentication process is abbreviate, network weakness is exposure. In this paper, we propose handover scheme for support realtime service as VoIP, Picure communication, Streaming Data Service in order to support partially encryption method. In experiment, proposed scheme is proof which process time is increment 20% more than previous scheme.

  • PDF

A Study on Security Architecture for FMIPv6 (FMIPv6 적용을 위한 보안 아키텍처 연구)

  • Son Sang-Woo;Kim Mun-Gi;Rhee Byung-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1183-1186
    • /
    • 2006
  • FMIPv6는 Mobile IPv6에서의 빠른 핸드오버를 지원하기 위해 고안된 프로토콜이다. 이 프로토콜은 핸드오버시 이동할 라우터의 정보를 예측하여 Fast Binding Update(FBU)를 한다는 장점을 제공한다. 그러나, 현재 FMIPv6 프로토콜은FBU전송 시 이동 노드와 라우터 사이에 서로를 완벽히 신뢰할 수 없다는 문제점을 가진다. 이를 보완하기 위한 신뢰 보안기능이 요구되었다. 따라서, 본 논문에서는 FMIPv6 프로토콜을 구조적으로 보안성을 강화시킬 아키텍처를 제안하였다.

  • PDF

Boundary Zone Overlapping Scheme for Fast Handoff Based on Session Key Reuse (AAA MIP 환경에서 공유영역 기반 세션키 재사용을 통한 고속 핸드오프 방식 연구)

  • Choi, Yu-Mi;Chung, Min-Young;Choo, Hyun-Seung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.481-488
    • /
    • 2005
  • The Mobile W provides an efficient and scalable mechanism for host mobility within the Internet. However, the mobility implies higher security risks than static operations in fixed networks. In this paper, the Mobile IP has been adapted to allow AAA protocol that supports authentication, authorization, and accounting(AAA) for security and collection for accounting information of network usage by mobile nodes(MNs). For this goal, we Propose the boundary tone overlapped network structure while solidifying the security for the authentication of an MN. That is, the Proposed scheme delivers the session keys at the wired link for MN's security instead of the wireless one, so that it provides a fast and seamless handoff mechanism. According to the analysis of modeling result, the proposed mechanism compared to the existing session key reuse method is up to about $40\%$ better in terms of normalized surcharge for the handoff failure rate that considers handoff total time.

Perofrmance Analysis of Mobility Support Protocol in Each Layer (계층간 이동성 지원 프로토콜들의 성능 분석)

  • Lee, Hyo-Beom;Kim, Kwang-Ryoul;Hwang, Seung-Hee;Min, Sung-Gi
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.2
    • /
    • pp.134-142
    • /
    • 2007
  • Several mobility supporting protocols have been proposed across OSI reference layers. Each protocol has similar or different characteristics based on its operating layer which affect a handover latency. In this paper, we analyze handover performance of most representative protocols in each layer. For analysis, we use SUBNET model based Markovian model and movement model. In result, difference of protocol handover latency is not occurred by DAD but also by security, movement detection, message processing time.