Mohanaprasanth. P and B Sridevi. Article: Secured Cost Effective Group based Handover Authentication Scheme for Mobile WiMAX Networks. IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences ICIIIOES(11):13-17, December 2013. Full text available. BibTeX
@article{key:article, author = {Mohanaprasanth. P and B. Sridevi}, title = {Article: Secured Cost Effective Group based Handover Authentication Scheme for Mobile WiMAX Networks}, journal = {IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences}, year = {2013}, volume = {ICIIIOES}, number = {11}, pages = {13-17}, month = {December}, note = {Full text available} }
Abstract
Technological improvement of Wireless Communication is important aspect of our daily life. Mobile WiMAX IEEE 802. 16m standard aims at fulfilling the requirements on 4G Systems. Providing seamless handover authentication is a critical issue in this area. This paper proposes a grouping of mobile stations algorithm to reduce the handover latency including security considerations. In our scheme the MSs which have similar Signal to Interference-plus-Noise Ratio (SINR) are grouped into the same handover group. In that MS group, while the first MS of the same handover group leaves from the service base station (SBS) to target BS (tBS), the SBS transmits all the details of the handover group member's security context to the tBS. Hence the rest of the MS in that group avoids the Extensible Authentication Protocol (EAP) and Security Context Transfer phases and directly performs the handover authentication which reduces the handover latency.
References
- IEEE standard 802. 16m-2011, "Air interface for broadband wireless access systems - Amendment 3: advanced air interface," May 2011.
- C. Politis, K. A. Chew, N. Akhtar, et al. , "Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks," IEEE Wireless Commun. , vol. 11, no. 4, pp. 76–88, Aug. 2004.
- C. M. Huang and J. W. Li, "A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture," Wireless Commun. Mob. Comput. vol. 9, no. 10, pp. 1387–1401, Oct. 2009.
- J. Hur, H. Shim, P. Kim, et al. , "Security considerations for handover schemes in mobile WiMAX networks," in Proc. 2008 WCNC, pp. 2531– 2536.
- A. Fu, Y. Zhang, Z. Zhu. et al. , "A fast handover authentication mechanism based on ticket for IEEE 802. 16m," IEEE Commun. Lett. vol. 14, no. 12, pp. 1134–1136, Dec. 2010.
- L. Shan, F. Liu, and K. Yang, "Performance analysis of group handover scheme for IEEE 802. 16j-enabled vehicular networks," in Proc. 2009 Advances in Data and Web Management, pp. 653–658.
- F. Pereniguez, G. Kambourakis, R. Marin-Lopez, et al. , "Privacy enhanced fast re-authentication for EAP-based next generation network," Comput. Commun. vol. 33, no. 14, pp. 1682–1694, Sep. 2010.
- Q. Jing, Y. Zhang, A. Fu, et al. , "A privacy preserving handover authentication schemes for EAP-based wireless networks," in Proc. 2011 GLOBECOM, pp. 1769–1774.
- C. Zhang, R. Lu, P. Ho, et al. , "A location privacy preserving authentication scheme in vehicular networks," in Proc. 2008 WCNC, pp. 2543–2548.
- L. Lee, D. Kim, B. Chung, et al. , "Adaptive hysteresis using mobility correlation for fast handover," IEEE Commun. Lett. vol. 12, no. 2, pp. 152–154, Feb. 2008.
- H. H. Choi, J. B. Lim, H. Hwang, et al. , "Optimal handover decision algorithm for throughput enhancement in cooperative cellular networks," in Proc. 2010 IEEE VTC – Fall, pp. 1–5.