Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Secured Cost Effective Group based Handover Authentication Scheme for Mobile WiMAX Networks

Print
PDF
IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
© 2013 by IJCA Journal
ICIIIOES - Number 11
Year of Publication: 2013
Authors:
Mohanaprasanth. P
B. Sridevi

Mohanaprasanth. P and B Sridevi. Article: Secured Cost Effective Group based Handover Authentication Scheme for Mobile WiMAX Networks. IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences ICIIIOES(11):13-17, December 2013. Full text available. BibTeX

@article{key:article,
	author = {Mohanaprasanth. P and B. Sridevi},
	title = {Article: Secured Cost Effective Group based Handover Authentication Scheme for Mobile WiMAX Networks},
	journal = {IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences},
	year = {2013},
	volume = {ICIIIOES},
	number = {11},
	pages = {13-17},
	month = {December},
	note = {Full text available}
}

Abstract

Technological improvement of Wireless Communication is important aspect of our daily life. Mobile WiMAX IEEE 802. 16m standard aims at fulfilling the requirements on 4G Systems. Providing seamless handover authentication is a critical issue in this area. This paper proposes a grouping of mobile stations algorithm to reduce the handover latency including security considerations. In our scheme the MSs which have similar Signal to Interference-plus-Noise Ratio (SINR) are grouped into the same handover group. In that MS group, while the first MS of the same handover group leaves from the service base station (SBS) to target BS (tBS), the SBS transmits all the details of the handover group member's security context to the tBS. Hence the rest of the MS in that group avoids the Extensible Authentication Protocol (EAP) and Security Context Transfer phases and directly performs the handover authentication which reduces the handover latency.

References

  • IEEE standard 802. 16m-2011, "Air interface for broadband wireless access systems - Amendment 3: advanced air interface," May 2011.
  • C. Politis, K. A. Chew, N. Akhtar, et al. , "Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks," IEEE Wireless Commun. , vol. 11, no. 4, pp. 76–88, Aug. 2004.
  • C. M. Huang and J. W. Li, "A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture," Wireless Commun. Mob. Comput. vol. 9, no. 10, pp. 1387–1401, Oct. 2009.
  • J. Hur, H. Shim, P. Kim, et al. , "Security considerations for handover schemes in mobile WiMAX networks," in Proc. 2008 WCNC, pp. 2531– 2536.
  • A. Fu, Y. Zhang, Z. Zhu. et al. , "A fast handover authentication mechanism based on ticket for IEEE 802. 16m," IEEE Commun. Lett. vol. 14, no. 12, pp. 1134–1136, Dec. 2010.
  • L. Shan, F. Liu, and K. Yang, "Performance analysis of group handover scheme for IEEE 802. 16j-enabled vehicular networks," in Proc. 2009 Advances in Data and Web Management, pp. 653–658.
  • F. Pereniguez, G. Kambourakis, R. Marin-Lopez, et al. , "Privacy enhanced fast re-authentication for EAP-based next generation network," Comput. Commun. vol. 33, no. 14, pp. 1682–1694, Sep. 2010.
  • Q. Jing, Y. Zhang, A. Fu, et al. , "A privacy preserving handover authentication schemes for EAP-based wireless networks," in Proc. 2011 GLOBECOM, pp. 1769–1774.
  • C. Zhang, R. Lu, P. Ho, et al. , "A location privacy preserving authentication scheme in vehicular networks," in Proc. 2008 WCNC, pp. 2543–2548.
  • L. Lee, D. Kim, B. Chung, et al. , "Adaptive hysteresis using mobility correlation for fast handover," IEEE Commun. Lett. vol. 12, no. 2, pp. 152–154, Feb. 2008.
  • H. H. Choi, J. B. Lim, H. Hwang, et al. , "Optimal handover decision algorithm for throughput enhancement in cooperative cellular networks," in Proc. 2010 IEEE VTC – Fall, pp. 1–5.