• Title/Summary/Keyword: handover authentication

Search Result 67, Processing Time 0.028 seconds

Optimized Route Optimization mode of MIPv6 between Domains Based on AAA (관리상의 도메인간 이동시 AAA 기반의 핸드오버 성능향상 방안)

  • Ryu, Seong-Geun;Mun, Young-Song
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.9
    • /
    • pp.39-45
    • /
    • 2009
  • When Mobile IPv6 is deployed in commercial network, a mobile node needs AAA services for an authentication, authorization and accounting. AAA and Mobile IPv6 are protocols which are operated independently. Then schemes which merge these protocols have been emerged. These schemes can enable a mobile node to establish a security association between the mobile node and a home agent and to perform a binding update for the home agent using AAA authentication request. But these schemes introduce many signal messages and long handover latency during the handover, since Route Optimization mode for Mobile Ipv6 is performed using Return Routability procedure. To solve this problem, we propose a scheme for Route Optimization mode that the home agent performs the binding update for a correspondent node via the AAA infrastructure between the home agent and the correspondent node instead of Return Routability procedure. For performance evaluation, we analyze signal message transmission costs and handover latencies during handover. We show performance improvement of the proposed scheme which reduces handover latency as 61% compared with the existing scheme.

Network Architecture and Fast Vertical Handover Scheme for UMTS-WLAN Interworking (UMTS-WLAN 간 빠른 수직적 핸드오버 제공을 위한 연동망 모델 및 핸드오버 방식)

  • Kim, In-Cheol;Lee, Sung-Kuen;Kim, Eal-Lae;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.492-501
    • /
    • 2007
  • UMTS-WLAN interworking approach can make the best use of the advantages of both networks by eliminating the stand-alone defects of the two services. For the interworking mechanisms of WLANs and UMTS networks, two major solutions have been proposed, namely loose coupling and tight coupling. The loose coupling approach provides separate data paths for WLAN and UMTS. On the other hand, the tight coupling provides a full integration of the WLAN network and the UMTS core network. The loose coupling has been preferred due to the simplicity and less reconfiguration requirement. However, loose coupling is worse in seamless mobility, QoS provision, and network security. In order to lessen the problems involved in the UMTS-WLAN interworking approaches, we propose a new interworking network architecture and a fast vertical handover scheme by employing Mobility Anchor(MA) for interworking between the two different networks. MA can enable authentication and session initialization before L2 handover of the mobile terminal, so that the seamless and fast vertical handover become possible. Thru analysis and numerical experiments, we proved that the proposed scheme has been validated.

A Handover Mechanism for Authenticate Subscriber between inter-network in Mobile WiMAX Environment (Mobile WiMAX 환경에서 인터 네트워크간 가입자를 인증하기 위한 핸드오버 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Kim, Jae-Hong;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.181-188
    • /
    • 2008
  • Nowadays, WiMAX which provides internet service with a middle and low speed serves more function and is wider than Wi-Fi. While they solve the security risks as subscribers do handover by subscriber's re-certification procedure as the Network range is getting wider, there are more security problems making the problems of electric-power consumption and delay. This paper suggests a handover mechanism which simplify the subscriber's re-certification procedure and prevents a security problem as doing handover for solving the problem of delay and the rate of processing. The mechanism can cooperate with PKI structure to increase flexibility and security and minimize network re-entry procedure or re-certification procedure by providing continual service. As a result. the mechanism's throughput as the number of subscribers is lower than IEEE 802.16e and the mechanism proves that it is secure from the attack of man-in-the-middle and reply as doing handover.

  • PDF

An Enhanced Network-based Mobility Management Protocol for Fast Mobility Support

  • Lee, Sung-Kuen;Lee, Kyoung-Hee;Lee, Hyun-Woo;Hong, Seng-Phil;Park, Jin-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1997-2015
    • /
    • 2011
  • In this paper, we propose the enhanced network-based mobility management protocol, called enhanced proxy mobile ipv6 (E-PMIPv6), which can provide mobile nodes (MNs) with a fast and efficient mobility service in PMIPv6 domain. The proposed scheme can provide a fast and efficient mobility service to MNs and also the strength of network scalability and stability to an access network by proposing the dynamic virtual hierarchical network architecture. In addition, the pre-authentication procedure for an MN, based on the information of neighbor mobile access gateway (MAG) list in the enhanced-policy server (E-PS), is proposed to support seamless handover by reducing MN's handover latency. Through performance evaluations of numerical analyses and simulations, we have confirmed and verified the superiority of the proposed scheme compared to the conventional proxy mobile ipv6 (PMIPv6).

User Pre-Authentication Method for Support of Fast Mobility in IEEE 802.11 Wireless LAN (IEEE 802.11 무선랜에서 고속 이동성 지원을 위한 사용자 사전 인증 기법)

  • Kwon, Jung-Ho;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.191-200
    • /
    • 2007
  • As the IEEE 802.11 WLAN has widely installed as a high-speed wireless network information infrastructure, there has been growing interest in both security and mobility of mobile terminals. However, for the case of mobile terminal employing IEEE 802.11i security standard, it is known that the user authentication procedure of IEEE 802.1x for stronger security enforcement may, due to its large delay, not be suitable for real-time multimedia communication. In this paper, we have proposed fast authentication method to resolve the above authentication delay problem, and verifies its performance via simulation analysis. Mobile terminals can get AP information reliably, and selectively execute authentication in advance during handover, which results in fast user authentication. In addition, by effectively managing the authentication information in mobile terminal, which are distributed in advance for pre-authentication, the problem of long-time revelation of authentication information has been solved.

An Efficient Hierarchical Authentication Scheme through Brokers in Mobile IPv6 Networks (브로커를 통한 모바일 IPv6 네트워크의 효율적인 계층적 인증기법)

  • Jung, Ha-Gwon;Jeong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.15-26
    • /
    • 2011
  • As quick and secure mobility service is becoming a critical issue in the ubiquitous environment. Internet Engineering Task Force (IETF) has done a lot of meaningful work in order to cope with the critical issues, which is a key technology of guaranteeing the legally and safely using of network resources, they has proposed Hierarchical Mobile IPv6 (HMIPv6) to complement for such problems as handover latency and signaling overhead in existing MIPv6. Most of the current research about HMIPv6 focuses on how to optimize the interactive processes between the HMIPv6 and AAA (Authentication, Authorization, Accounting) protocol. This paper describes a cost-effective hierarchical authentication scheme, which makes its focus on minimizing the authentication latency in AAA processing. In this scheme, a hierarchical AAA architecture is proposed, in which the AAA servers are deployed on the Mobility Anchor Point (MAP), the Root AAA server manages several Leaf AAA servers and the Brokers on behalf of the AAA server in home domain. The simulation results shows that the proposed scheme reduces the handoff and authentication latency evidently compared to the previous traditional authentication combination modeling.

A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments (MIH 환경에서 카멜레온 해쉬 기반의 인증값을 이용한 선행 인증 기법)

  • Chae, Kang-Suk;Choi, Jae-Duck;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.840-848
    • /
    • 2010
  • This paper proposes a proactive authentication scheme using credentials based on chameleon hashing in MIH environments. There is a proactive authentication structure defined by IEEE 802.21 Security Study Group for the link access in MIH environment. Both schemes based on EAP and on PKI can be applied to such structure, but the former has caused network traffic due to the complicated authentication procedure and the latter has complex structure for managing certificates. The proposed scheme performs the proactive authentication procedure only between a mobile node and a MIH Key Holder by using credentials based on chameleon hashing. Our scheme reduces the network traffic since authentication with the server is unnecessary in MIH environment and PKI structure is not required as well. In addition, the proposed scheme provides secure PFS and PBS features owing to the authenticated Diffie-Hellman key exchange of the chameleon-based credential.

Leveraging Proxy Mobile IPv6 with SDN

  • Raza, Syed M.;Kim, Dongsoo S.;Shin, DongRyeol;Choo, Hyunseung
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.460-475
    • /
    • 2016
  • The existing Proxy Mobile IPv6 suffers from a long handover latency which in turn causes significant packet loss that is unacceptable for seamless realtime services such as multimedia streaming. This paper proposes an OpenFlow-enabled proxy mobile IPv6 (OF-PMIPv6) in which the control of access gateways is centralized at an OpenFlow controller of a foreign network. The proposed OF-PMIPv6 separates the control path from the data path by performing the mobility control at the controller, whereas the data path remains direct between a mobile access gateway and a local mobility anchor in an IP tunnel form. A group of simple OpenFlow-enabled access gateways performs link-layer control and monitoring activities to support a comprehensive mobility of mobile nodes, and communicates with the controller through the standard OpenFlow protocol. The controller performs network-layer mobility control on behalf of mobile access gateways and communicates with the local mobility anchor in the Proxy Mobile IPv6 domain. Benefiting from the centralized view and information, the controller caches the authentication and configuration information and reuses it to significantly reduce the handover latency. An analytical analysis of the proposed OF-PMIPv6 reactive and proactive handover schemes shows 43% and 121% reduction in the handover latency, respectively, for highly utilized network. The results gathered from the OF-PMIPv6 testbed suggest similar performance improvements.

The Fast and Secure Authentication Mechanism for Proxy Mobile IPv6 (고속의 안전한 Proxy Mobile IPv6 인증 메커니즘)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.11-24
    • /
    • 2012
  • Without a proper protection mechanism for the signaling messages to be used for the mobility support in the Proxy Mobile IPv6 (PMIPv6), it is also vulnerable to several security attacks such as redirect attack, MITM (Man-In-The-Middle) attack, replay attack and DoS (Denial of Service) attack as in Mobile IPv6. In this paper, we point out some problems of previous authentication mechanisms associated with PMIPv6, and also propose a new fast and secure authentication mechanism applicable to PMIPv6. In addition, it is also shown that the proposed one is more efficient and secure than the previous ones.

Mobility Management Scheme based on User Mobility QoS and Security-Effective Network in Heterogeneous Mobile Networks (이종의 모바일 네트워크에서 사용자 이동성 QoS와 보안효과적인 네트워크 기반의 이동성관리 기법)

  • Lee, Hyeungwoo;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.87-97
    • /
    • 2015
  • To support the efficient mobility MIPv6v, FMIPv6, HMIPv6 and host-based mobility management protocols have been developed. AAAC (Authentication, Authorization, Accounting and Charging) system is applied in this paper analyzed the the existing IPv6 PMIPv6, FPMIPv6 network security effective and IPv6 MMP (Mobile Management Protocol) Features and performance analysis is performed. And IPv6 MMP seamless transfer performance in terms of packet loss probability, will be analyzed. That can be efficiently used as a method for the integration of QoS and mobility so that you can manage and control the resources presented QoSB usage. Results of evaluation results showed a better overall fast handover structure of mobility management techniques. PMIPv6 and FPMIPv6 in many respects the most efficient structure that can be specifically, a fast handover of the structure of the network-based mobility management scheme showed the best results.