Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fast Re- authentication of Mobile Users Minor Thesis Qasim Al-Mamari.

Similar presentations


Presentation on theme: "Fast Re- authentication of Mobile Users Minor Thesis Qasim Al-Mamari."— Presentation transcript:

1 Fast Re- authentication of Mobile Users Minor Thesis Qasim Al-Mamari

2 Agenda Introduction Related Work Protocol Specification Implementation Results Future Work Q & A

3 Introduction As a mobile user, the attributes of the device in use changes as the user traverse different networks or even sub-networks. The loss of an authenticated session means that the user needs to undergo the authentication process again to continue their effort. Performance and reliability of mobile networks is dependent on the capability of the access point providing the connectivity and on the movement of the mobile user where signals fade away when the user travels away from the access point

4 Related Work The current EAP implementation [RFC3748] does not support fast re-authentication of mobile nodes Other extensions such as EAP-TTLS PEAP pre-authentication has to be based on a concreted algorithm that defines the mobile nodes next point of association. Yoshihiro et al addresses these issues and provides a Keberized Handover Keying (KHK) mechanism based on Kerberos ticketing technology. The use of Kerberos introduces the issue of clock synchronization.

5 Protocol Specification X Z : [{Nx X}kprx] kpuz ; Z X: [{Nx Z} kprz] kpux. X Y : [{Nx Z}kprx] kpuy ; Z Y : [{Nx Z} kprz] kpuy. Notations: X: home access point. Y: neighbouring access point. Z: mobile user. Kpr* : indicates the private key of participant * Kpu*: indicates the public key of participant *. Nx: indicates the nonce produced by participant x.

6 Results Strand Spaces proofs protocols authenticity and secrecy. FDR proofs protocol does not have design flaws. Much faster than existing protocols because the mobile node is not required to produce a nonce. The mobile node does not need to authenticate the current access point.

7 Future Work Use of less power consuming cryptography algorithms such as AES will be invistigated.

8 Q & A Questions, Comments, Concerns!


Download ppt "Fast Re- authentication of Mobile Users Minor Thesis Qasim Al-Mamari."

Similar presentations


Ads by Google