A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks
نویسندگان
چکیده
In this paper, we propose a handover authentication mechanism, called handover key management and authentication scheme (HaKMA), which as a three-layer authentication architecture is a new version of our previous work Diffie-Hellman-PKDS-based authentication method (DiHam for short) by improving its key generation flow and adding a handover authentication scheme to respectively speed up handover process and increase the security level for mobile stations (MS). AAA server supported authentication is also enhanced by involving an improved extensible authentication protocol (EAP). According to the analyses of this study, the HaKMA is more secure than the compared schemes, including the PKMv2 and DiHam.
منابع مشابه
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks
In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short), improving its key generation flow and adding a handover authentication scheme to respectively...
متن کاملConstructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other
Recently, wireless communication has been popularly used in our everyday life. However, its security is a crucial work since messages are broadcasted via wireless channels through which hackers can intercept the massages and then know the contents of the messages. That is why security has been one of the most important issues in wireless communication studies. Encrypting messages to ciphertext ...
متن کاملImproving Security Levels of IEEE 802.16e Authentication By Diffie-Hellman Method
In this paper, we proposed an authentication method according to Diffie-Hellman. First, we introduce different methods for authentication in IEEE.802.16 then we proposed an authentication method according to Diffie-Hellman and in the last we compare different methods for authentication to improve security in IEEE802.16e. CPN is a useful for simulation and compare protocol together so we use CPN...
متن کاملAn Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network
Password-based Authenticated Key Agreement (PAKA) protocols are widely used in wireless mobile networks, however many existing PAKA protocols have security flaws. In the 3GPP2 network, there are several PAKA protocols proposed to enhance the security of the Authentication Key distribution mechanism which is subjected to the Man-In-The-Middle attack. We point out the security flaws of such proto...
متن کاملAuthenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
The article proposes a provably secure authenticated multiple key establishment protocol for Wireless Sensor Network. Security of the protocol is based on the computational infeasiblity of solving Elliptic Curve Discrete Logarithm Problem and Computational Diffie-Hellman Problem on Bilinear Pairing. User authentication is a one of the most challenging security requirement in wireless sensor net...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011