CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secured Cost Effective Group based Handover Authentication Scheme for Mobile WiMAX Networks

Published on December 2013 by Mohanaprasanth. P, B. Sridevi
International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
Foundation of Computer Science USA
ICIIIOES - Number 11
December 2013
Authors: Mohanaprasanth. P, B. Sridevi
ba418544-9441-473c-bda7-252ad2cb8fba

Mohanaprasanth. P, B. Sridevi . Secured Cost Effective Group based Handover Authentication Scheme for Mobile WiMAX Networks. International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences. ICIIIOES, 11 (December 2013), 13-17.

@article{
author = { Mohanaprasanth. P, B. Sridevi },
title = { Secured Cost Effective Group based Handover Authentication Scheme for Mobile WiMAX Networks },
journal = { International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences },
issue_date = { December 2013 },
volume = { ICIIIOES },
number = { 11 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 13-17 },
numpages = 5,
url = { /proceedings/iciiioes/number11/14359-1364/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
%A Mohanaprasanth. P
%A B. Sridevi
%T Secured Cost Effective Group based Handover Authentication Scheme for Mobile WiMAX Networks
%J International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
%@ 0975-8887
%V ICIIIOES
%N 11
%P 13-17
%D 2013
%I International Journal of Computer Applications
Abstract

Technological improvement of Wireless Communication is important aspect of our daily life. Mobile WiMAX IEEE 802. 16m standard aims at fulfilling the requirements on 4G Systems. Providing seamless handover authentication is a critical issue in this area. This paper proposes a grouping of mobile stations algorithm to reduce the handover latency including security considerations. In our scheme the MSs which have similar Signal to Interference-plus-Noise Ratio (SINR) are grouped into the same handover group. In that MS group, while the first MS of the same handover group leaves from the service base station (SBS) to target BS (tBS), the SBS transmits all the details of the handover group member's security context to the tBS. Hence the rest of the MS in that group avoids the Extensible Authentication Protocol (EAP) and Security Context Transfer phases and directly performs the handover authentication which reduces the handover latency.

References
  1. IEEE standard 802. 16m-2011, "Air interface for broadband wireless access systems - Amendment 3: advanced air interface," May 2011.
  2. C. Politis, K. A. Chew, N. Akhtar, et al. , "Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks," IEEE Wireless Commun. , vol. 11, no. 4, pp. 76–88, Aug. 2004.
  3. C. M. Huang and J. W. Li, "A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture," Wireless Commun. Mob. Comput. vol. 9, no. 10, pp. 1387–1401, Oct. 2009.
  4. J. Hur, H. Shim, P. Kim, et al. , "Security considerations for handover schemes in mobile WiMAX networks," in Proc. 2008 WCNC, pp. 2531– 2536.
  5. A. Fu, Y. Zhang, Z. Zhu. et al. , "A fast handover authentication mechanism based on ticket for IEEE 802. 16m," IEEE Commun. Lett. vol. 14, no. 12, pp. 1134–1136, Dec. 2010.
  6. L. Shan, F. Liu, and K. Yang, "Performance analysis of group handover scheme for IEEE 802. 16j-enabled vehicular networks," in Proc. 2009 Advances in Data and Web Management, pp. 653–658.
  7. F. Pereniguez, G. Kambourakis, R. Marin-Lopez, et al. , "Privacy enhanced fast re-authentication for EAP-based next generation network," Comput. Commun. vol. 33, no. 14, pp. 1682–1694, Sep. 2010.
  8. Q. Jing, Y. Zhang, A. Fu, et al. , "A privacy preserving handover authentication schemes for EAP-based wireless networks," in Proc. 2011 GLOBECOM, pp. 1769–1774.
  9. C. Zhang, R. Lu, P. Ho, et al. , "A location privacy preserving authentication scheme in vehicular networks," in Proc. 2008 WCNC, pp. 2543–2548.
  10. L. Lee, D. Kim, B. Chung, et al. , "Adaptive hysteresis using mobility correlation for fast handover," IEEE Commun. Lett. vol. 12, no. 2, pp. 152–154, Feb. 2008.
  11. H. H. Choi, J. B. Lim, H. Hwang, et al. , "Optimal handover decision algorithm for throughput enhancement in cooperative cellular networks," in Proc. 2010 IEEE VTC – Fall, pp. 1–5.
Index Terms

Computer Science
Information Sciences

Keywords

Wimax Group Handover Authentication Extensible Authentication Protocol (eap) Key Generation.