Efficient authentication and key distribution in wireless IP networks
- 1 December 2003
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Wireless Communications
- Vol. 10 (6) , 52-61
- https://doi.org/10.1109/mwc.2003.1265853
Abstract
Emerging broadband access technologies such as 802.11 are enabling the introduction of wireless IP services to an increasing number of users. Market forecasts suggest that a new class of network providers, commonly referred to as wireless Internet service providers, will deploy public wireless networks based on these new technologies. In order to offer uninterrupted IP service combined with ubiquitous seamless mobility, these multiprovider networks need to be integrated with each other, as well as with wide-area wireless technologies such as third-generation cdma2000 and UMTS. Therefore, efficient authentication and dynamic key exchange protocols that support heterogeneous domains as well as networks with roaming agreements across trust boundaries are key to the success of wide-area wireless IP infrastructures. In this article we first describe a simple network model that accounts fro heterogeneity in network service providers, and put forward the requirements any authentication and key exchange protocol that operates in such a model should satisfy, in terms of network efficiency, security, and fraud prevention. We then introduce a new authentication and key exchange protocol, wireless shared key exchange (W-SKE). We characterize properties and limitations of the W-SKE against the requirements discussed earlier. Finally, we contrast W-SKE against other well-known and emerging approaches.Keywords
This publication has 15 references indexed in Scilit:
- SKEME: a versatile secure key exchange mechanism for InternetPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A scheme for authentication and dynamic key exchange in wireless networksBell Labs Technical Journal, 2002
- PPP EAP TLS Authentication ProtocolPublished by RFC Editor ,1999
- The Internet Key Exchange (IKE)Published by RFC Editor ,1998
- A security architecture for the Internet ProtocolIBM Systems Journal, 1998
- HMAC: Keyed-Hashing for Message AuthenticationPublished by RFC Editor ,1997
- Authentication of mobile usersIEEE Network, 1994
- Systematic design of a family of attack-resistant authentication protocolsIEEE Journal on Selected Areas in Communications, 1993
- How to construct random functionsJournal of the ACM, 1986
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978