8
Fast Re- authentication of Mobile Users Minor Thesis Qasim Al-Mamari

Fast Re-authentication of Mobile Users

Embed Size (px)

DESCRIPTION

Fast Re-authentication of Mobile Users. Minor Thesis Qasim Al-Mamari. Agenda. Introduction Related Work Protocol Specification Implementation Results Future Work Q & A. Introduction. - PowerPoint PPT Presentation

Citation preview

Page 1: Fast Re-authentication of Mobile Users

Fast Re-authentication of Mobile Users

Minor Thesis

Qasim Al-Mamari

Page 2: Fast Re-authentication of Mobile Users

Agenda

Introduction Related Work Protocol Specification Implementation Results Future Work Q & A

Page 3: Fast Re-authentication of Mobile Users

Introduction

As a mobile user, the attributes of the device in use changes as the user traverse different networks or even sub-networks.

The loss of an authenticated session means that the user needs to undergo the authentication process again to continue their effort.

Performance and reliability of mobile networks is dependent on the capability of the access point providing the connectivity and on the movement of the mobile user where signals fade away when the user travels away from the access point

Page 4: Fast Re-authentication of Mobile Users

Related Work

The current EAP implementation [RFC3748] does not support fast re-authentication of mobile nodes

Other extensions such as EAP-TTLS PEAP pre-authentication has to be based on a concreted algorithm that

defines the mobile node’s next point of association. Yoshihiro et al addresses these issues and provides a Keberized

Handover Keying (KHK) mechanism based on Kerberos ticketing

technology. The use of Kerberos introduces the issue of clock

synchronization.

Page 5: Fast Re-authentication of Mobile Users

Protocol Specification

X Z : [{Nx X}kprx] kpuz ; Z X: [{Nx Z} kprz] kpux. X Y : [{Nx Z}kprx] kpuy ; Z Y : [{Nx Z} kprz] kpuy.

Notations: X: home access point. Y: neighbouring access point. Z: mobile user. Kpr* : indicates the private key of participant * Kpu*: indicates the public key of participant *. Nx: indicates the nonce produced by participant x.

Page 6: Fast Re-authentication of Mobile Users

Results

Strand Spaces proofs protocol’s authenticity and secrecy.

FDR proofs protocol does not have design flaws. Much faster than existing protocols because the mobile

node is not required to produce a nonce. The mobile node does not need to authenticate the

current access point.

Page 7: Fast Re-authentication of Mobile Users

Future Work

Use of less power consuming cryptography algorithms such as AES will be invistigated.

Page 8: Fast Re-authentication of Mobile Users

Q & A

Questions, Comments, Concerns!