Authentication Optimization for Vertical Handover in Heterogeneous Wireless Networks

Ikram Smaoui, Faouzi Zarai, Mohammad S. Obaidat, Lotfi Kamoun

2012

Abstract

In this paper, we present a scheme for reducing vertical handover delay in heterogeneous wireless networks by optimizing the network access authentication procedure as it is a heavy burden due to its latencies and overhead. Indeed, optimizing the authentication procedure while at the same time providing the same or best level of security represents a key factor in the design of the next generation of heterogeneous wireless networks. In this context, the aim of our work in this paper is to provide a security framework accounting for heterogeneity in wireless access networks without degrading the security level currently provided by each wireless system. We also demonstrate using simulation analysis the handover performance improvement provided by our proposed security frame work.

References

  1. Smaoui, I., Zarai, F., Kamoun, L., 2007. “Vertical handoff management for next generation heterogeneous networks”, 5th International Conference on Information and Communications Technology (ICICT 2007), pp. 19-25.
  2. Rajavelsamy, R., Jeedigunta, V., Osok Song, 2007. “A Novel Method for Authentication Optimization during Handover in Heterogeneous Wireless Networks”, 2nd International Conference on Communication Systems Software and Middleware, COMSWARE 2007, pp.1-5.
  3. Smaoui, I. Zarai, F., Banat, M., Kamoun, L., 2010. “Heterogeneous Wireless Networks: Configuration and Vertical Handoff Management”, Wireless Personal Communications, Vol. 54, No. 3, pp. 417- 445.
  4. Arkko, J., Haverinen, H., 2006. “Extensible Authentication Protocol method for 3rd Generation Authentication and Key Agreement (EAPAKA)”, RFC 4187.
  5. 3GPP TS 33.102, 2006. “Technical Specification group services and system aspects, 3G security; Security Architecture”, release 7.
  6. Mun, H., Han, K., Kim, K., 2009. "3G-WLAN Interworking: Security Analysis and New Authentication and Key Agreement based on EAPAKA", IEEE Wireless Telecommunications Symposium, WTS 2009, pp. 1-8.
  7. Daly, I., Zarai, I., Kamoun, L., 2011.“Design and implementation of a simulation environment for the evaluation of authentication protocols in IEEE 802.11s networks”, 3rd International ICST Conference on Mobile Lightweight Wireless ystems, Bilbao Espagne.
Download


Paper Citation


in Harvard Style

Smaoui I., Zarai F., S. Obaidat M. and Kamoun L. (2012). Authentication Optimization for Vertical Handover in Heterogeneous Wireless Networks . In Proceedings of the International Conference on Signal Processing and Multimedia Applications and Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2012) ISBN 978-989-8565-25-9, pages 249-254. DOI: 10.5220/0004011602490254


in Bibtex Style

@conference{winsys12,
author={Ikram Smaoui and Faouzi Zarai and Mohammad S. Obaidat and Lotfi Kamoun},
title={Authentication Optimization for Vertical Handover in Heterogeneous Wireless Networks},
booktitle={Proceedings of the International Conference on Signal Processing and Multimedia Applications and Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2012)},
year={2012},
pages={249-254},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004011602490254},
isbn={978-989-8565-25-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Signal Processing and Multimedia Applications and Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2012)
TI - Authentication Optimization for Vertical Handover in Heterogeneous Wireless Networks
SN - 978-989-8565-25-9
AU - Smaoui I.
AU - Zarai F.
AU - S. Obaidat M.
AU - Kamoun L.
PY - 2012
SP - 249
EP - 254
DO - 10.5220/0004011602490254