By Topic

Extended Security Analysis of Multi-Hop Ticket Based Handover Authentication Protocol in the 802.16j Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Ling Tie ; Dept. of Inf. Sci. & Tech., Chengdu Univ., Chengdu, China ; Yong Yi

Multi-hop and relay concepts have attracted a great deal of interest in 802.16j network, because relay can expand coverage and improve throughput. However, security handover in 802.16j is the main challenge. With the help of the relay station, the mobile station can authenticate with the target base station before the mobile station handovers to the target cell. This can reduce handover authentication delay significantly. In this paper, we propose a multi-hop handover authentication protocol based on ticket concept adopted from Kerberos. A mobile station, a relay station and a target base station can mutually authenticate each other using multi-hop method. The main task of this paper is formal analysis of our proposed authentication protocol. We extend the honest and ideal ideas in the strand space model to include message authentication code. This extended formal analysis model shows that our proposed protocol is secure. The confidentiality and authentication can be proved.

Published in:

Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conference on

Date of Conference:

21-23 Sept. 2012