A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems

Fanyang; Xiong, Naixue; Park, Jong
July 2012
Journal of Supercomputing;Jul2012, Vol. 61 Issue 1, p166
Academic Journal
Since the 802.16e standard has been released, there are few authentication pattern schemes and Extensible Authentication Protocol (EAP) selection proposals for manufacturers to choose from in large-scale network systems. This paper focuses on the re-authentication method's design, improvement, and optimization for the PMP mode of the IEEE 802.16e standard in large-scale network systems to ensure the security of the keys. We first present an optimized scheme, called EAP_AKAY, based on the EAP-AKA authentication method (Arkko and Haverinen in Extensible Authentication Protocol Method for UMTS Authentication and Key Agreement (EAP-AKA), ), and then a self-adaptive K selection mechanism is proposed for re-authentication load balancing based on EAP_AKAY in large-scale network systems. This presented mechanism considers the cost of authentication, not only at the server end, but also at the client end. Thus, this scheme would minimize the total cost and resolve the limitation in current schemes. Furthermore, the K value would be re-selected, not only when MS is roaming to another BS region, but also in residing time to adapt to network environment changes. The simulation results and relevant analysis demonstrate that our scheme is effective in terms of the total cost of authentication, master key renewal, and good security.


Related Articles

  • Secure Network Access and Enterprise Mobility. RICHARDS, KATHLEEN // Information Security;Jul/Aug2013, Vol. 15 Issue 6, p2 

    An introduction to the journal is presented in which the editor discusses various reports related to information security published within the issue including data from the annual Enterprise Mobile Security Survey for the second quarter of 2013, an update on isolation techniques to control...

  • Preventing Manets from Blackhole Attack using Blackhole Node Detection Monitoring System. Jain, Parita; Aggarwal, Puneet Kumar // International Journal of Computer Applications;Apr2012, Vol. 44, p34 

    Mobile Adhoc networks are prone to number of security threats due to unavailability of centralized authority. It incorporates various malicious activities within the network. This research focuses on single Blackhole attack but our design principles may be applicable to wide range of attacks....

  • Research of multilevel security network based on mobile IPv6. Dan Yu; Shi Lin Fang // Applied Mechanics & Materials;2014, Issue 556-562, p6019 

    Multilevel security technology has broad applications in military and commercial aspects, the key technology in the research of multilevel security network, based on the BLP model of a security enhancement model is presented, and proved its security of the model. Secondly, based on the analysis...

  • Sharing the risk. Lunden, Ingrid // Total Telecom Magazine;Mar2009, p18 

    The article reports that while the mobile content business grows into a huge industry, content growth is also translating into greater complexity for mobile communication system operators and their partners, leading to spiralling costs. According to the article, an increasing number of mobile...

  • CONTROL BREAK INTERNATIONAL DEBUTS SAFEBOOT VERSION 4.27.  // Productivity Software;Sep2004, Vol. 17 Issue 9, p1 

    Control Break International has debuted Service Pack 2 for version 4.27 of SafeBoot, the company's flagship solution. This release provides rich new functionality including support for encryption during hibernation mode as well as the encryption of data stored during a "crash dump." Typically,...

  • Top 10 Reasons to Control Employee PDAs. Elfanbaum, Bob; Dinman, Mark // Security: Solutions for Enterprise Security Leaders;Jun2004, Vol. 41 Issue 6, p36 

    Lists concerns that a company should address in getting their handheld security or personal digital assistants (PDA) in order, based on feedback from executives in the U.S. Network passwords; Customer data; Items that should never be stored on a mobile device such as credit card and account...

  • Cracking the enterprise market. Luna, Lynnette // America's Network;1/15/2005, Vol. 109 Issue 1, p24 

    The article focuses on security and wireless segments of telecommunication industry. It informs that security consistently tops the list when it comes lo enterprise spending priorities, but investment in wireless technology--both wireless local area networks (WLANs) and mobile devices--will...

  • SECURITY PRODUCTS.  // Communications News;Apr2007, Vol. 44 Issue 4, p20 

    Reviews are offered of various products for computer network security, including the Advent/Net SecureCentral patch management software program, the Deep Security 5 host-intrustion detection system, and iSeries continuity management programs for mobile communications systems protection.

  • Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach. Lin, Chi; Wu, Guowei // Journal of Supercomputing;Nov2013, Vol. 66 Issue 2, p989 

    In the node capture attack, the adversary intelligently captures nodes and extracts the cryptographic keys from their memories to destroy the security, reliability and confidentiality of the wireless sensor networks. However, it suffers from low attacking efficiency and high resource...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics