TY - JOUR
T1 - Security and efficiency in roaming services for wireless networks
T2 - Challenges, approaches, and prospects
AU - He, Daojing
AU - Chen, Chun
AU - Bu, Jiajun
AU - Chan, Sammy
AU - Zhang, Yan
PY - 2013
Y1 - 2013
N2 - Seamless roaming over wireless networks is highly desirable to mobile users, but ensuring the security and efficiency of this process is challenging. Although the same may be said for all communication systems, roaming services have special requirements and vulnerabilities, and therefore deserve special attention. Over the years, we have seen a variety of authentication protocols emerging to address this issue. However, which protocol is the most effective is still debatable. In this article, we first identify the challenges unique to roaming services as a set of mandatory and optional requirements. Next, we provide a brief state-of-the-art survey of existing work and point out their limitations in securing roaming services, especially in resistance against denial of service attacks, efficient authentication, flexible roaming in mobile contexts, as well as backward and forward non-linkabilities. To complement the security provided by the existing work, we then propose some mechanisms that can meet the aforementioned security and efficiency requirements. Finally, we present challenges that need to be addressed in roaming authentication. © 1979-2012 IEEE.
AB - Seamless roaming over wireless networks is highly desirable to mobile users, but ensuring the security and efficiency of this process is challenging. Although the same may be said for all communication systems, roaming services have special requirements and vulnerabilities, and therefore deserve special attention. Over the years, we have seen a variety of authentication protocols emerging to address this issue. However, which protocol is the most effective is still debatable. In this article, we first identify the challenges unique to roaming services as a set of mandatory and optional requirements. Next, we provide a brief state-of-the-art survey of existing work and point out their limitations in securing roaming services, especially in resistance against denial of service attacks, efficient authentication, flexible roaming in mobile contexts, as well as backward and forward non-linkabilities. To complement the security provided by the existing work, we then propose some mechanisms that can meet the aforementioned security and efficiency requirements. Finally, we present challenges that need to be addressed in roaming authentication. © 1979-2012 IEEE.
UR - http://www.scopus.com/inward/record.url?scp=84873910697&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-84873910697&origin=recordpage
U2 - 10.1109/MCOM.2013.6461199
DO - 10.1109/MCOM.2013.6461199
M3 - RGC 21 - Publication in refereed journal
SN - 0163-6804
VL - 51
SP - 142
EP - 150
JO - IEEE Communications Magazine
JF - IEEE Communications Magazine
IS - 2
M1 - 6461199
ER -