handover authentication for mobile networks

advertisement
HANDOVER AUTHENTICATION FOR MOBILE NETWORKS:
SECURITY AND EFFICIENCY ASPECTS
ABSTRACT
A handover authentication module in mobile networks enables mobile nodes to securely and
seamlessly roam over multiple access points. However, designing an appropriate handover
authentication protocol is a difficult task because wireless networks are susceptible to attacks,
and mobile nodes have limited power and processing capability. In this article, we identify
the security and efficiency requirements of a good handover authentication protocol and
analyze the existing related protocols, and show that many such protocols are either insecure
or inefficient. Then we review a recently proposed protocol named Pair Hand, which has
been shown to outperform all other protocols on security and efficiency. Furthermore, we
propose a novel protocol named Hash Hand that not only inherits the merits of Pair- Hand
and efficiently eliminates its security vulnerabilities, but also provides a session key update
mechanism. Experiments using our implementation on resource-limited laptop PCs show that
Hash Hand is feasible for practical mobile networks.
EXISTING SYSTEM
There are two major challenging issues in the design of handover authentication protocols.
The first one is efficiency. On one hand, MNs generally have limited processing capability
and power. On the other hand, in order to avoid connection disruption due to handover, a
tight time limit is usually imposed on the handover process. For example, the IEEE suggests
that the handover latency should be kept below 50ms, of which the authentication process
should not take more than 20 ms. Therefore, a handover authentication process is required to
be computationally efficient. The second issue is security and privacy. While an
authentication scheme aims to check the legitimacy of incoming MNs, it should also be
designed to stand against security attacks such as denialof- service (DoS) attacks.
PROPOSED SYSTEM
In this article, we first discuss the security and efficiency requirements of handover
authentication protocols. Then we review the earlier proposed protocols, and discuss how
their security weaknesses and efficiency problems are overcome by Pair Hand. Subsequently,
a more novel handover authentication protocol, Hash Hand, is designed. While preserving
the merits of Pair Hand, Hash Hand is more secure, and more efficient, in terms of
computation and communication overheads, than Pair Hand. Our analysis demonstrates that
Hash Hand satisfies the security requirements of protocols of its kind. Moreover,
experimental results from our implementation in resource-limited laptop PCs confirm that
Hash Hand is feasible in practice.
Further Details Contact: A Vinay 9030333433, 08772261612
Email: info@takeoffprojects.com | www.takeoffprojects.com
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
•
System
: Pentium IV 2.4 GHz.
•
Hard Disk
: 40 GB.
•
Floppy Drive
: 1.44 Mb.
•
Monitor
: 15 VGA Colour.
•
Mouse
: Logitech.
•
Ram
: 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating System
: Windows XP
 Programming Language
: JAVA
 Java Version
: JDK 1.6 & above.
 Database
: MYSQL
Further Details Contact: A Vinay 9030333433, 08772261612
Email: info@takeoffprojects.com | www.takeoffprojects.com
Download