HANDOVER AUTHENTICATION FOR MOBILE NETWORKS: SECURITY AND EFFICIENCY ASPECTS ABSTRACT A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task because wireless networks are susceptible to attacks, and mobile nodes have limited power and processing capability. In this article, we identify the security and efficiency requirements of a good handover authentication protocol and analyze the existing related protocols, and show that many such protocols are either insecure or inefficient. Then we review a recently proposed protocol named Pair Hand, which has been shown to outperform all other protocols on security and efficiency. Furthermore, we propose a novel protocol named Hash Hand that not only inherits the merits of Pair- Hand and efficiently eliminates its security vulnerabilities, but also provides a session key update mechanism. Experiments using our implementation on resource-limited laptop PCs show that Hash Hand is feasible for practical mobile networks. EXISTING SYSTEM There are two major challenging issues in the design of handover authentication protocols. The first one is efficiency. On one hand, MNs generally have limited processing capability and power. On the other hand, in order to avoid connection disruption due to handover, a tight time limit is usually imposed on the handover process. For example, the IEEE suggests that the handover latency should be kept below 50ms, of which the authentication process should not take more than 20 ms. Therefore, a handover authentication process is required to be computationally efficient. The second issue is security and privacy. While an authentication scheme aims to check the legitimacy of incoming MNs, it should also be designed to stand against security attacks such as denialof- service (DoS) attacks. PROPOSED SYSTEM In this article, we first discuss the security and efficiency requirements of handover authentication protocols. Then we review the earlier proposed protocols, and discuss how their security weaknesses and efficiency problems are overcome by Pair Hand. Subsequently, a more novel handover authentication protocol, Hash Hand, is designed. While preserving the merits of Pair Hand, Hash Hand is more secure, and more efficient, in terms of computation and communication overheads, than Pair Hand. Our analysis demonstrates that Hash Hand satisfies the security requirements of protocols of its kind. Moreover, experimental results from our implementation in resource-limited laptop PCs confirm that Hash Hand is feasible in practice. Further Details Contact: A Vinay 9030333433, 08772261612 Email: info@takeoffprojects.com | www.takeoffprojects.com SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: Operating System : Windows XP Programming Language : JAVA Java Version : JDK 1.6 & above. Database : MYSQL Further Details Contact: A Vinay 9030333433, 08772261612 Email: info@takeoffprojects.com | www.takeoffprojects.com