Security considerations for handover schemes in mobile WiMAX networks

Junbeom Hur, Hyeongseop Shim, Pyung Kim, Hyunsoo Yoon, Nah Oak Song

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Citations (Scopus)

Abstract

IEEE 802.16e uses EAP-based authentication and key management for link layer security. Due to the lack of ability to support mobility, however, EAP-based key management becomes a principal impediment to the achievement of an efficient and secure handover in IEEE 802.16e mobile WiMAX networks. In this paper, an overview of the EAP-based handover procedures of the latest IEEE 802.16e standard is given and their security flaws are analyzed. Possible solutions for secure handover in IEEE 802.16e networks are also proposed in this paper. The proposed handover protocol guarantees a backward/forward secrecy while gives little burden over the previous handover protocols.

Original languageEnglish
Title of host publicationWCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings
Pages2531-2536
Number of pages6
Publication statusPublished - 2008 Sep 18
Externally publishedYes
EventIEEE Wireless Communications and Networking Conference, WCNC 2008 - Las Vegas, NV, United States
Duration: 2008 Mar 312008 Apr 3

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Other

OtherIEEE Wireless Communications and Networking Conference, WCNC 2008
CountryUnited States
CityLas Vegas, NV
Period08/3/3108/4/3

Fingerprint

Wireless networks
Network protocols
Authentication
Defects

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Hur, J., Shim, H., Kim, P., Yoon, H., & Song, N. O. (2008). Security considerations for handover schemes in mobile WiMAX networks. In WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings (pp. 2531-2536). [4489476] (IEEE Wireless Communications and Networking Conference, WCNC).

Security considerations for handover schemes in mobile WiMAX networks. / Hur, Junbeom; Shim, Hyeongseop; Kim, Pyung; Yoon, Hyunsoo; Song, Nah Oak.

WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. 2008. p. 2531-2536 4489476 (IEEE Wireless Communications and Networking Conference, WCNC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hur, J, Shim, H, Kim, P, Yoon, H & Song, NO 2008, Security considerations for handover schemes in mobile WiMAX networks. in WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings., 4489476, IEEE Wireless Communications and Networking Conference, WCNC, pp. 2531-2536, IEEE Wireless Communications and Networking Conference, WCNC 2008, Las Vegas, NV, United States, 08/3/31.
Hur J, Shim H, Kim P, Yoon H, Song NO. Security considerations for handover schemes in mobile WiMAX networks. In WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. 2008. p. 2531-2536. 4489476. (IEEE Wireless Communications and Networking Conference, WCNC).
Hur, Junbeom ; Shim, Hyeongseop ; Kim, Pyung ; Yoon, Hyunsoo ; Song, Nah Oak. / Security considerations for handover schemes in mobile WiMAX networks. WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. 2008. pp. 2531-2536 (IEEE Wireless Communications and Networking Conference, WCNC).
@inproceedings{d87f6635504b4fb5aabab723cea37587,
title = "Security considerations for handover schemes in mobile WiMAX networks",
abstract = "IEEE 802.16e uses EAP-based authentication and key management for link layer security. Due to the lack of ability to support mobility, however, EAP-based key management becomes a principal impediment to the achievement of an efficient and secure handover in IEEE 802.16e mobile WiMAX networks. In this paper, an overview of the EAP-based handover procedures of the latest IEEE 802.16e standard is given and their security flaws are analyzed. Possible solutions for secure handover in IEEE 802.16e networks are also proposed in this paper. The proposed handover protocol guarantees a backward/forward secrecy while gives little burden over the previous handover protocols.",
author = "Junbeom Hur and Hyeongseop Shim and Pyung Kim and Hyunsoo Yoon and Song, {Nah Oak}",
year = "2008",
month = "9",
day = "18",
language = "English",
isbn = "9781424419968",
series = "IEEE Wireless Communications and Networking Conference, WCNC",
pages = "2531--2536",
booktitle = "WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings",

}

TY - GEN

T1 - Security considerations for handover schemes in mobile WiMAX networks

AU - Hur, Junbeom

AU - Shim, Hyeongseop

AU - Kim, Pyung

AU - Yoon, Hyunsoo

AU - Song, Nah Oak

PY - 2008/9/18

Y1 - 2008/9/18

N2 - IEEE 802.16e uses EAP-based authentication and key management for link layer security. Due to the lack of ability to support mobility, however, EAP-based key management becomes a principal impediment to the achievement of an efficient and secure handover in IEEE 802.16e mobile WiMAX networks. In this paper, an overview of the EAP-based handover procedures of the latest IEEE 802.16e standard is given and their security flaws are analyzed. Possible solutions for secure handover in IEEE 802.16e networks are also proposed in this paper. The proposed handover protocol guarantees a backward/forward secrecy while gives little burden over the previous handover protocols.

AB - IEEE 802.16e uses EAP-based authentication and key management for link layer security. Due to the lack of ability to support mobility, however, EAP-based key management becomes a principal impediment to the achievement of an efficient and secure handover in IEEE 802.16e mobile WiMAX networks. In this paper, an overview of the EAP-based handover procedures of the latest IEEE 802.16e standard is given and their security flaws are analyzed. Possible solutions for secure handover in IEEE 802.16e networks are also proposed in this paper. The proposed handover protocol guarantees a backward/forward secrecy while gives little burden over the previous handover protocols.

UR - http://www.scopus.com/inward/record.url?scp=51649125749&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=51649125749&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:51649125749

SN - 9781424419968

T3 - IEEE Wireless Communications and Networking Conference, WCNC

SP - 2531

EP - 2536

BT - WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings

ER -