Mobile Lightweight Wireless Systems. Third International ICST Conference, MOBILIGHT 2011, Bilbao, Spain, May 9-10, 2011, Revised Selected Papers

Research Article

Re-authentication Protocol for Vertical Handoff in Heterogeneous Wireless Networks

Download
541 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-29479-2_17,
        author={Ikbel Daly and Faouzi Zarai and Lotfi Kamoun},
        title={Re-authentication Protocol for Vertical Handoff in Heterogeneous Wireless Networks},
        proceedings={Mobile Lightweight Wireless Systems. Third International ICST Conference, MOBILIGHT 2011, Bilbao, Spain, May 9-10, 2011, Revised Selected Papers},
        proceedings_a={MOBILIGHT},
        year={2012},
        month={10},
        keywords={Re-authentication protocol Heterogeneous Wireless Networks 3GPP LTE Mesh networks Handoff Security},
        doi={10.1007/978-3-642-29479-2_17}
    }
    
  • Ikbel Daly
    Faouzi Zarai
    Lotfi Kamoun
    Year: 2012
    Re-authentication Protocol for Vertical Handoff in Heterogeneous Wireless Networks
    MOBILIGHT
    Springer
    DOI: 10.1007/978-3-642-29479-2_17
Ikbel Daly1,*, Faouzi Zarai1,*, Lotfi Kamoun1,*
  • 1: University of Sfax
*Contact email: ikbel.daly@isecs.rnu.tn, faouzi.zarai@isecs.rnu.tn, lotfi.kamoun@isecs.rnu.tn

Abstract

The Heterogeneous Wireless Networks (HWN) is a type of framework which includes different varieties of wireless technologies. To ensure a robust management and a reliable behavior of HWN, it is necessary to well manage the interworking between its technologies and in particular to secure interworking and roaming between the 3rd Generation Partnership Project (3GPP)/Long Term Evolution (LTE) and Wireless Local Mesh Networks. A whole of solutions has been proposed to solve this problem; we quote mainly Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) which still suffers from some vulnerabilities such as, man-in-the-middle attack, Sequence Number (SQN) synchronization, and disclosure of user identity. In this paper, we propose new re-authentication protocol. The suggested solution proves its effectiveness following the studies of simulation which carried out according to different criteria handoff latency, loss and blocking rate.