Formal Analysis of an Efficient Handover Authentication Scheme for EAP-Based Wireless Networks with Extending BAN Logic

Article Preview

Abstract:

The existing Extensible Authentication Protocol (EAP) based handover authentication schemes have show robust security features especially the Qi Jing et al.'s design, which not only meets the essential security requirements in handover authentication but also achieves privacy preservation. However, it still suffers pitfalls in the process of authentication. The main idea of this paper is to extend the work by Qi Jing et al. and particularly focus on the formal analysis using extending BAN logic which is more concise yet practical to use on PKI-based protocols.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1864-1867

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. M. Fu, Y. Q. Zhang, Z. C. Zhu, Q. Jing, J. Y. Feng, An efficient handover authentication scheme with privacy preservation for IEEE 802. 16m network, Computers & Security. 31(2012) 741-749.

DOI: 10.1016/j.cose.2012.06.008

Google Scholar

[2] Y. Heung Youl, Extensible authentication protocol overview and its applications, IEICE Transactions on Information and Systems. E92-D(2009)766-776.

DOI: 10.1587/transinf.e92.d.766

Google Scholar

[3] T. N. Nguyen, M. D. Ma, An Pre-authentication Protocol with Symmetric Keys for Secure Handover in Mobile WiMAX Networks, 2012 IEEE International Conference on Communications. (2012).

DOI: 10.1109/icc.2012.6363817

Google Scholar

[4] A. M. Fu, S. H. Lan, B. Huang, Z. C. Zhu, Y. Q. Zhang, A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks, IEEE Communications Letters. 16(2012) 1744-1747.

DOI: 10.1109/lcomm.2012.091212.120575

Google Scholar

[5] H. Almus, E. Brose, K. Rebensburg, kerberos-based EAP method for re-authentication with integrated support for fast handover and IP mobility in wireless LANs, 2008 Second International Conference on Communications and Electronics. (2008).

DOI: 10.1109/cce.2008.4578934

Google Scholar

[6] J. Choi,S. Jung, A Handover Authentication Using Credentials Based on Chameleon Hashing, IEEE Communications Letters. 14(2010) 54-56.

DOI: 10.1109/lcomm.2010.01.091607

Google Scholar

[7] K. Yoohwan, R. Wei, J. Ju-Yeon, J. Yingtao, Z. Jun, SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography, 2007 IEEE International Conference on Communications. (2008) 1570-1575.

DOI: 10.1109/icc.2007.263

Google Scholar

[8] J. Qi, Z. Yuqing, F. Anmin, L. Xuefeng, A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks, Proceedings of the 2011 IEEE Global Communications Conference. (2011) 6.

DOI: 10.1109/glocom.2011.6133722

Google Scholar

[9] Burrows M, Abadi M, N. R, A logic of authentication, Proceedings of the Royal Society. (1989).

Google Scholar

[10] Sufatrio,Y. Roland, Extending BAN logic for reasoning with modern PKI-based protocols, 2008 IFIP International Conference on Network and Parallel Computing. (2008)190-197.

DOI: 10.1109/npc.2008.86

Google Scholar