Filters








610 Hits in 6.0 sec

MoTH: Mobile Terminal Handover Security Protocol for HUB Switching based on 5G and Beyond (5GB) P2MP Backhaul Environment

Jiyoon Kim, Philip Virgil Astillo, Vishal Sharma, Nadra Guizani, Ilsun You
2021 IEEE Internet of Things Journal  
Formal verification with Scyther To strengthen the claims on the security of the protocol in the initial, policy-update and handover phases, Scyther was used for the formal verification as it helps to  ...  FORMAL VERIFICATION This section aims to the formal verification of the proposed protocol.  ... 
doi:10.1109/jiot.2021.3082277 fatcat:7p7s5lks45gh5lqj77dfjr65yu

A Robust Vertical Handover Authentication for SDN based 5G HetNets.pdf [article]

Alican Ozhelvaci
2020 Figshare  
Therefore, in this paper, the focus is on secure and seamless handover mechanism to supply strong, quick and mutual authentication.  ...  5G is a new paradigm that brings new technologies to overcome the challenges of the next-generation wireless mobile network.  ...  RELATED WORK Designing an efficient, fast and secure authentication protocol is a tough task to give access to the user equipment in a foreign network.  ... 
doi:10.6084/m9.figshare.12674582.v1 fatcat:vgeddig6mjachnr2tyu3n5es44

Secure Handover Protocol for Mobile WiMAX Networks

S.-H. LEE, N.-S. PARK, J.-Y. CHOI
2008 IEICE transactions on information and systems  
We present a formal analysis of our protocol using a logic-based formal method. key words: secure handover, mobile WiMAX, IEEE 802.16e, cross function  ...  To overcome these vulnerabilities, we propose a secure handover protocol that guarantees mutual authentication and forward/backward secrecy in handover.  ...  This protocol involves designing a cross-layer and cross-function, to improve the handover latency of broadband wireless Manuscript networks.  ... 
doi:10.1093/ietisy/e91-d.12.2875 fatcat:vz25r5scqval5gycqxjllmqota

An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks

Cheng Xu, Xiaohong Huang, Maode Ma, Hong Bao
2018 Wireless Communications and Mobile Computing  
Due to the mobility and the broadcast nature of wireless communication, security of the vehicular networks is a critical issue for the academia and industry.  ...  For a vehicular LTE-A network, an authentication protocol should be able to fulfill a variety of security requirements, which can be met by our proposal and proved by using Burrows–Abadi–Needham (BAN)  ...  To ensure that our proposed scheme can resist malicious attacks, with the design of the security goals in mind, we use a formal verification tool of AVISPA for the formal verification of the proposed scheme  ... 
doi:10.1155/2018/6251219 fatcat:zxavcqpylbgyplhmtarmduthsa

A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR

Mahdi Aiash, Glenford Mapp, Aboubaker Lasebae, Raphael Phan, Jonathan Loo
2012 EURASIP Journal on Wireless Communications and Networking  
The results indicate that a new authentication and key agreement protocol is required to secure handover in this environment. Casper/ FDR, is used in the analysis and development of the protocol.  ...  To support these heterogeneous environments, there is a need to consider a new design of the network infrastructure.  ...  2 , the new protocol considers the security in the core network at the design stage.  ... 
doi:10.1186/1687-1499-2012-57 fatcat:tcr3zor27rgxfgf6ga7kpgkpvq

DMM-SEP: Secure and Efficient Protocol for Distributed Mobility Management based on 5G Networks

Jiyoon Kim, Philip Virgil Astillo, Ilsun You
2020 IEEE Access  
Motivated by this, we proposed a DMM-based handover security protocol that can support privacy and defend against redirection attacks in addition to providing essential security properties such as confidentiality  ...  In the 5G era, network mobility management is recognized as a very important factor for user service availability.  ...  The design of 5G architecture is expected to leverage heterogeneous network [1] coupled with ultra-dense wireless network [2] to provide a close to ''zero'' communication latency along with consistent  ... 
doi:10.1109/access.2020.2985448 fatcat:2kw6e7k5bnajljauyqxwesk5de

A Formally Verified Protocol for Secure Vertical Handovers in 4G Heterogeneous Networks

Naïm Qachri, Olivier Markowitch, Jean-Michel Dricot
2013 International Journal of Security and Its Applications  
In this paper, we propose a formally verified protocol to securely manage vertical handovers heterogeneous networks (HetNets), even when different cryptographic algorithms are used in the infrastructure  ...  The protocol presentation goes with a review of the current propositions of security mechanisms and procedures dedicated to manage vertical handovers.  ...  The second part focuses on a formal verification of the protocol with ProVerif [28] , i.e., a tool that automates the verification of security protocols.  ... 
doi:10.14257/ijsia.2013.7.6.32 fatcat:xwpg7kmeurdubojqk3djfpvyj4

A Competent Scheme For Rapid and Secure Handover Authentication Procedure of Mobile Nodes in Wireless Sensor Network

S.Asifa Begum S.Asifa Begum, D.Sathish Kumar D.Sathish Kumar
2012 International Journal of Scientific Research  
There is a chance of occurrence of communication delay by means of obtaining services from an increased number of access points which are formally deployed in Wireless sensor network.  ...  The most important issue security is maintained by updating the revoked user list correspondingly by server in a network, hence authentication is done by verifying the user revocation list.  ...  It uses a dynamic routing protocol for the wireless network communication which is dynamically adapted to the changing conditions. S.  ... 
doi:10.15373/22778179/apr2014/48 fatcat:fii26limxray7loeedtn6hafue

Improving the Handoff Latency of the Wireless Mesh Networks Standar

Reham Abdellatif Abouhogail
2016 International Journal of Security and Its Applications  
The current paper, p roposes a new, easy, fast, and secure handover design.  ...  Using of the encryption function gives the protocol more security strength, and prevents forgery attack. In this section, we present a formal verification of the proposed scheme using BAN Logic [21].  ...  The main target of wireless networks standards is to give users a seamless and secure roaming through the network.  ... 
doi:10.14257/ijsia.2016.10.5.07 fatcat:jd2q637vd5asflckmmpqeen5re

Secure and Fast Handovers Authentication Methods for Wi-Fi Based Networks: A Review perspective

Tahadray Jean Tsitaitse, Yongquan Cai, Shaldon Leparan Suntu, Muhammad Nafees Ulfat khan
2018 International Journal of Computer Networks And Applications  
Inter-access point protocol was used to transfer handover credentials in an intra-domain network.  ...  the existing schemes in wireless fidelity based networks.  ...  Therefore, authentication is the primary step for the security of a wireless network designed to support roaming capabilities [5] .  ... 
doi:10.22247/ijcna/2018/49434 fatcat:7arnrnayoze3bpob3a2nfmchkq

Enhancing MISP with Fast Mobile IPv6 Security

Ilsun You, Jong-Hyouk Lee, Yoshiaki Hori, Kouichi Sakurai
2011 Mobile Information Systems  
A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers  ...  In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers.  ...  Since MISP establishes a secure connection between the MN and the BR in a short time, it has been considered to be an efficient and fast authentication method for a wireless access network in Japan.  ... 
doi:10.1155/2011/148959 fatcat:tzkvkor7kjg3jhgmic64a724vu

Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks

Daojing He, Jiajun Bu, Sammy Chan, Chun Chen
2013 IEEE transactions on computers  
A secure and efficient handover authentication protocol should satisfy the following requirements: 616  ...  To satisfy the security and privacy requirements, it is prerequisite to elaborately design an efficient handover authentication mechanism to achieve security and privacy preservation for practical wireless  ...  Obviously, designing a secure and efficient handover authentication protocol is a nontrivial task because wireless networks are vulnerable to attacks and mobile users are resource-constrained.  ... 
doi:10.1109/tc.2011.258 fatcat:2qsz5b6w5vfild4bgzin56whpe

Formal verification of LTE-UMTS handover procedures

Piergiuseppe Bettassa Copet, Guido Marchetto, Riccardo Sisto, Luciana Costa
2015 2015 IEEE Symposium on Computers and Communication (ISCC)  
This paper presents a formal security analysis of the interoperability procedures between LTE and the older Universal Mobile Telecommunications System (UMTS) networks, when mobile devices seamlessly switch  ...  Most of the formal security analysis works in literature about LTE analyze authentication procedures, while interoperability is far less considered.  ...  In the past, formal verification has already been applied to security protocols for mobile networks.  ... 
doi:10.1109/iscc.2015.7405602 dblp:conf/iscc/CopetMSC15 fatcat:7iz3avnpwfds3pygpo7hmusc5m

High Performance SDN WLAN Architecture

Kristián Košťál, Rastislav Bencel, Michal Ries, Peter Trúchly, Ivan Kotuliak
2019 Sensors  
The fast seamless handover with QoS enables efficient usage of radio resources in large networks.  ...  Wireless Local Area Network (WLAN) infrastructure is a dominant technology for direct access to the Internet and for cellular mobile data traffic offloading to WLANs.  ...  Formal verification was not present in other solutions. This formal verification refers to correctness of VAP concept and proposed protocol.  ... 
doi:10.3390/s19081880 fatcat:6ygiz4yffjh5nhrstia25544d4

Formal Security Analysis of EAP-ERP Using Casper

Khosrow Ramezani, Elankayer Sithirasenan, Kaile Su
2016 IEEE Access  
This requires the mobile device and the wireless networks be capable of performing a vertical handover, when the mobile nodes find themselves in the vicinity of a foreign network.  ...  Future wireless networks will exploit a variety of wireless technologies to provide ubiquities connectivity to mobile devices in the form of cellular, Wireless Local Area Networks, and femtocells.  ...  ACKNOWLEDGEMENT The authors would like to acknowledge the continuing support by Professor Gavin Lowe from the Department of Computer Science at the University of Oxford, in relation to the use of Casper  ... 
doi:10.1109/access.2016.2517179 fatcat:dkdficxctjeszfd5in64hdbu2e
« Previous Showing results 1 — 15 out of 610 results