1 Introduction

Since 2005, the introduction of the IEEE 802.16e standard with mobility support [1] has enabled WIMAX users to get access to mobile broadband services. However, security has been the major concern in the deployment because many threats associated with different layers of the protocol stack exist in the mobile WiMAX systems. For instances, there are scrambling and jamming attacks at the physical layer and the issues of user authentication and data confidentiality at the MAC layer, while black-hole attacks and other miscellaneous attacks may impair the operations at the network layer etc...[2]. As a consequence, security issues become a vital requirement to prevent mobile WiMAX systems from the various attacks and to increase the reliability. Mobile WiMAX system allows a mobile station (MS) to handover between the coverage areas of different base stations (BSs) from the same or different access service networks (ASNs). For security purpose, the MS has to authenticate itself to the network through the target BS (tBS) or the target ASN gateway (tASN) before access to any service is granted. Currently, mobile WiMAX is using the extensible authentication protocol (EAP)-based authentication [3] for handover (HO) due to its flexibility and high security level. This authentication mechanism uses a backend authentication server (AS) and as a result, the authenticator does not need to be updated whenever there are new authentication methods. However, the EAP-based authentication involves time-consuming public key-based cryptographic operations and the authentication process requires several rounds of information exchange between the MS and the AS. As the result, the latency for a full EAP-based authentication can be 1000 ms, which is much longer compared to the recommended maximum HO latency of 150 ms for streaming applications.

Researchers have proposed various methods to reduce the authentication delay during WIMAX Hos without compromising security requirements. These methods mainly follow the two approaches, namely the re-authentication and the pre-authentication approaches. By re-authentication approaches [46], the authentication delay is reduced by reusing the secret information exchanged between the MS and the AS in the previous authentication session. In [4], the HOKEY working group has proposed the EAP-based re-authentication protocol (ERP), where the MS and the AS use the extended master session key (EMSK) from previous EAP authentication to derive the master session key (MSK) for the current authentication session. Thus, ERP has significantly reduced the delay caused by several rounds of EAP message exchange to the delay of a single round of ERP message exchange. Other proposals such as [5, 6] allow the MSs to have instant access to the basic network services through a weak but fast authentication using previous credentials. The MS is then required to complete a stronger and more costly authentication in order to access services with higher security requirements. Re-authentication approaches focus on reducing the number of the messages exchanged and cryptographic operations, while by pre-authentication approaches [710], shared secret keys are computed by the MS and the AS before a HO so that only the TEK 3-way handshake is performed during the HO authentication. As the result, pre-authentication approach offers the shortest delay for the authentication signaling. Not only that, in this approach, the cryptographic material will not be reused, hence it is more secure compared to re-authentication approach. The HOKEY working group has proposed a pre-authentication model for the MS to pre-authenticate itself with multiple candidate authenticators before a HO happens [7]. Based on this model, an EAP-based pre-authentication scheme (EPA) is proposed for the inter-ASN Hos in [8]. Pre-authentication approach has also been applied into the intra-ASN Hos as in [9], by which the AS pre-distributes unique pair-wise master keys (PMKs) to neighbor BSs (nBSs) which are candidates for the future HO. One common drawback of these pre-authentication schemes is the wastage of unnecessary efforts for key exchange between the MS and those neighbor ASNs/BSs which may be never roamed to. Recently, we have proposed a scheme called enhanced EAP-based pre-authentication scheme (EEP) [10] which overcome this drawback by allowing the MS to exchange the secret keys with the AS instead of the neighbor ASNs (nASNs). However, pre-authentication proposals such as the one in [8, 10] have made use of public key cryptography, which can consume great amount of computational resources.

The authentication process may suffer negative effectiveness if its corresponding key management is weak in wireless networks. The key management issue has been addressed to allow users to generate public keys to achieve authentication, integrity, and confidentiality in WiMAX systems in [11]. Recent research works have focused on the interoperability between WiMAX systems and WiFi systems as the literatures [1214] with different handover schemes designed to support WiFi-WiMAX integration in a heterogeneous network (HetNet). However, it is beyond the scope of this paper.

In this paper, as our major contribution, we propose a fast and secure Symmetric Keys for EAP-based pre-authentication protocol (SKEP) for the inter-ASN Hos. SKEP uses symmetric key cryptography to secure the pre-authentication message exchange with low demand of computational resource, thus making the HO authentication more efficient. By allowing the MS to exchange keying materials with the AS instead of nASNs, it can eliminate the wastage of unnecessary key exchanges. Moreover, since SKEP does not reuse secret key materials from the previous authentication session, it guarantees high level of security. BAN logic is used to prove that our proposed scheme can meet the security requirements of an authentication protocol.

The rest of this paper is organized as follows. In Sect. 2, we review the network model, Mobile WiMAX’s standard HO procedure and the EAP-based authentication. The proposed SKEP scheme is presented in Sect. 3. The formal verification on the security functionality using BAN logic and the performance analysis of the proposed scheme are provided in Sects. 4 and 5 respectively. Finally, Sect. 6 concludes the paper. For the abbreviations of the terminologies used in our paper, please refer to the Appendix.

2 Background

2.1 Network model

The typical Mobile WiMAX system shown in Fig. 1 consists of three major types of equipment. They are the MSs, the ASNs owned by the network access provider (NAP), and the connectivity service networks (CSNs) owned by the network service provider (NSP). An ASN consists of multiple BSs and an ASN-GW. It offers radio access to the MSs. An ASN-GW is located at the boundary of the ASN to connect the BSs and the CSN which provides IP connectivity service to the MSs. It also acts as a proxy for the authentication between the MSs and the AS, which resides in the CSN. The IEEE802.16e standard specifies two types of Hos for Mobile WiMAX, namely intra-ASN HO and inter-ASN HO. The intra-ASN HO happens when a MS moves between BSs which belong to the same ASN. The inter-ASN HO happens when a MS moves from the hBS in the coverage of the home ASN (hASN) to another BS in the coverage of a different ASN.

Fig. 1
figure 1

The WiMAX network reference model

2.2 Standard handover procedure

In this section, the standard inter-ASN HO is described (Fig. 2). The HO decision can be triggered by a request from the MS or the hBS through MOB_MSHO-REQ or MOB_BSHO-REQ message, respectively. A list of nBSs which are candidates for HO is selected either by the MS or by the hBS. The hBS will send the HO notification messages to these candidates over the backbone network to notify that the MS intends to HO. Those nBSs which accept the HO request will send an accept response to the hBS and they become potential tBSs. The hBSs choose one from these potential tBSs and send a HO confirmation to the selected tBS. Thereafter, the hBS informs the MS of the selected tBS by sending the MS the MOB_BSHO-RSP message in the case of MS-initiated HO or the MOB_BSHO-REQ in the case of BS-initiated HO. Upon receiving this message, the MS makes its final HO decision and sends an MOB_HO-IND message to start the HO.

Upon receiving the MOB_HO-IND message, the hBS sets a timer to disconnect the MS and at the same time, the MS starts the synchronization and ranging process with the tBS, followed with the network re-entry procedure, which includes basic capability negotiation, authentication and registration. If the HO is successful, the MS can start using services provided by the new hBS.

Fig. 2
figure 2

The handover procedure in mobile WiMAX systems

2.3 The EAP-based authentication

The operation of the EAP transport layer security (EAP-TLS)-based authentication is shown in Fig. 3. The EAP-TLS-based authentication provides strong mutual authentication [15]. As a result, it has been selected by the WiMAX forum as one of the options for the MS-AS authentication. To start the authentication process, the MS sends a link-up requesting message to the BS, which is relayed to the authenticator in the ASN in order to notify the authenticator that a MS is connecting to the network. The authenticator acquires the MS’s identity through the EAP Request/Identity and EAP Response/Identity messages and relays the response message to the AS over the RADIUS protocol [16]. From there, the MS and the AS exchange a few rounds of EAP-TLS authentication messages. If the MS is successfully authenticated, a 512-bit MSK is generated by both the MS and the AS and is transferred to the authenticator by the AS. The PMK is derived by truncating the MSK to 160 bits. The PMK is used to generate the authorization key (AK). The AK is transferred to the hBS, which is used for the security association-traffic encryption key (SA-TEK) 3-way handshake and key exchange. At the end of the authentication, the TEK for data encryption is shared between the MS and the hBS. The SKEP scheme is designed based on the EAP-TLS authentication.

Fig. 3
figure 3

EAP-TLS authentication

3 The proposed solution

In this section, we present our solution of the SKEP scheme. Basically, our scheme is an EAP-based pre-authentication protocol where the MS and the AS exchange a 48-byte pre-master secret (PMS) and nonce through pre-authentication messages to generate the MSK for future HO. This MSK will be delivered to the tASN during the HO initialization process so that the tASN and the MS can straightaway generate the AK and proceed with the SA-TEK 3-way handshake. The MSK and EMSK from the current authentication session are used to derive symmetric keys to encrypt and protect the integrity of the pre-authentication messages. With the newly proposed scheme, we aim to reduce long HO latency which is a well-known bottle neck of the mobile WiMAX systems and, at the same time, ensure high security level of an authentication protocol. Compared to other pre-authentication protocols, the SKEP protocol uses symmetric cryptography instead of public key cryptography, resulting in low computational resource consumption and faster pre-authentication process. The notations used are shown in Table 1. The procedure of the SKEP scheme (Fig. 4) is as follows:

Table 1 Notations
Fig. 4
figure 4

The SKEP scheme

Initialization step: when a MS first joins in the network, it performs the full EAP-TLS authentication with the hASN. SKEP scheme can be used for the next and future authentication sessions. The SKEP scheme is an EAP-based pre-authentication protocol. It is designed in such a way that the secret keys shared among communication entities after each authentication session by the SKEP scheme will be same as those by using the EAP-TLS authentication protocol. How secret keys are shared among communication entities are specified in Table 2. In order to provide security for the SKEP scheme, we propose the derivation of three new keys: two pre-authentication integrity keys (PIK1 and PIK2) and a pre-authentication encryption key (PEK) from the AK, the MSK, and the EMSK, respectively using the Dot16KDF function, which is specified in [1]:

$$\begin{aligned} \hbox {PIK1}= & {} \hbox {Dot16KDF}~(\hbox {AK}, ``\hbox {PIK1}\hbox {''}, 160) \end{aligned}$$
(1)
$$\begin{aligned} \hbox {PIK2}= & {} \hbox {Dot16KDF}~(\hbox {MSK}, ``\hbox {PIK2}\hbox {''}, 160) \end{aligned}$$
(2)
$$\begin{aligned} \hbox {PEK}= & {} \hbox {Dot16KDF}~(\hbox {EMSK}, ``\hbox {PEK}\hbox {''}, 128). \end{aligned}$$
(3)

The PIK1 is known by the MS, the hASN, and the hBS, and the PIK2 is known by the MS, the hASN, and the AS. They are used to calculate the Hash-based Message Authentication Codes (HMACs) to protect the integrity of the SKEP messages. The PEK is only known by the MS and the AS, and it is used to encrypt the PMS. The fact that each key is known to certain communication entities will make sure that each communication entity can only access certain information from the pre-authentication messages.

Table 2 Secret keys

The PIK1 is known by the MS, the hASN, and the hBS, and the PIK2 is known by the MS, the hASN, and the AS. They are used to calculate the hash-based message authentication codes (HMACs) to protect the integrity of the SKEP messages. The PEK is only known by the MS and the AS, and it is used to encrypt the PMS. The fact that each key is known to certain communication entities will make sure that each communication entity can only access certain information from the pre-authentication messages.

Step 1: After a successful HO to the hASN, the MS initiates a pre-authentication procedure by sending the PREAUTH_REQ message to the hBS. The PREAUTH_REQ message is constructed as followed:

$$\begin{aligned}&\hbox {P}=\hbox {ENC}_{\mathrm{PEK}} \left( {\hbox {PMS}} \right) \parallel \hbox {SN}\parallel \hbox {N}_{\mathrm{MS}} \parallel \hbox {ID}_{\mathrm{MS}} \end{aligned}$$
(4)
$$\begin{aligned}&\hbox {PREAUTH}\_\hbox {REQ}=\hbox {P}\parallel \hbox {HMAC}_{\mathrm{PIK}1} \left( \hbox {P} \right) \parallel \hbox {HMAC}_{\mathrm{PIK}2} \left( \hbox {P} \right) . \end{aligned}$$
(5)

In the above equation, the PMS and the nonce (\(\hbox {N}_{\mathrm{MS}})\) are generated by the MS. The PMS is the secret keying material to be sent to the AS and it is encrypted using the PEK. The \(\hbox {ID}_{\mathrm{MS}}\) is the 48-bit MS’ MAC address. The sequence number (SN) is 16 bits and aids in matching the PREAUTH_RSP with the corresponding PREAUTH_REQ. It is incremented whenever the MS initiates a new pre-authentication session. All communication entities maintain a record of the SN in the last request message received from the MS to prevent replay attacks.

Upon receiving the PREAUTH_REQ message from the MS, the hBS first checks the received SN, which must be greater than the SN stored in its memory for the message to be fresh. Next, it verifies the message’s origin and integrity by calculating the HMAC using the PIK1 and compares it with the first HMAC in the message. If the HMAC is the same and the message is fresh, the hBS sends the message to the hASN, which will be relayed immediately to the AS. Otherwise, the message will be discarded.

Step 2: At the AS, the PREAUTH_REQ message is put through a verification process similar to that at the hBS. The only difference is that instead of using the PIK1 to calculate the HMAC, the AS uses the PIK2 and the calculated HMAC is compared with the second HMAC in the message. If the message is genuine, the AS decrypts the cipher text using the PEK to obtain the PMS and keeps a record of the PMS and the \(\hbox {N}_{\mathrm{MS}}\). The PREAUTH_RSP message is constructed as followed:

$$\begin{aligned}&\hbox {P}^{\prime }=\hbox {ENC}_{\mathrm{PEK}} \left( {\hbox {PMS}+1} \right) \parallel \hbox {SN}\parallel \hbox {N}_{\mathrm{AS}} \parallel \hbox {ID}_{\mathrm{MS}} \end{aligned}$$
(6)
$$\begin{aligned}&\hbox {PREAUTH}\_\hbox {RSP}=\hbox {P}^{\prime }\parallel \hbox {HMAC}_{\mathrm{PIK}2} \left( {\hbox {P}^{\prime }} \right) \end{aligned}$$
(7)

This message is sent to the MS to acknowledge that the AS has received the secret PMS, and also to deliver the nonce \(\hbox {N}_{\mathrm{AS}}\) which is randomly generated by the AS. To prevent replay attack, the AS increments the PMS by 1 and encrypts it using the PEK.

This message is then sent to the hASN. Similar to the step 1, the hASN will verify the message and relay it to the hBS. We assume that the link between the hBS and the hASN is a secure-wired link; thus, the hBS does not have to check the message but relays it directly to the MS. The MS verifies the correctness of the received message and keeps a record of the \(\hbox {N}_{\mathrm{AS}}\). It also decrypts the cipher text using the PEK to confirm whether the AS has obtained the correct PMS.

Step 3: A HO begins with the MS’s decision to HO from the hBS to a tBS. Following the standard HO procedure, the hBS chooses one from the potential tBSs and sends a HO confirmation to the tBS over the backbone. Since this message passes through the tASN, it serves as a notification to inform the tASN that it is selected for the HO. As soon as it receives this notification, the tASN sends a KEY_REQ message to the AS containing the \(\hbox {ID}_{\mathrm{MS}}\) and \(\hbox {ID}_{\mathrm{tASN}}\). The AS will retrieve the PMS, \(\hbox {N}_{\mathrm{MS}}\) and \(\hbox {N}_{\mathrm{AS}}\) corresponding to the \(\hbox {ID}_{\mathrm{MS}}\) and derive the MSK in a way similar to that of the EAP-TLS key derivation in [15].

$$\begin{aligned} \hbox {Master}\_\hbox {secret}= & {} \hbox {TLS}-\hbox {PRF}-48\,(\hbox {PMS}, ``\hbox {master secret}\hbox {''},\,\hbox {N}_{\mathrm{MS}} \parallel \hbox {N}_{\mathrm{AS}} \parallel \hbox {ID}_{\mathrm{tASN}} ) \nonumber \\ \end{aligned}$$
(8)
$$\begin{aligned} \hbox {Key}\_\hbox {Material}= & {} \hbox {TLS}-\hbox {PRF}\nonumber \\&-128 (\hbox {Master}\_\hbox {secret},\,``\hbox {client}\,\hbox {EAP}\, \hbox {encryption}\hbox {''},\,\hbox {N}_{\mathrm{MS}} \parallel \hbox {N}_{\mathrm{AS}} \parallel \hbox {ID}_{\mathrm{tASN}} ) \nonumber \\ \end{aligned}$$
(9)
$$\begin{aligned} \hbox {MSK}= & {} \hbox {Key}\_\hbox {Material} \left( {0, 63} \right) \end{aligned}$$
(10)

More information on the TLS-PRF-X function can be found in [17]. By using the same key derivation algorithm as the EAP-TLS scheme, the SKEP scheme has guaranteed that the other keying materials such as the EMSK and the initialization vector (IV) can be derived so that the key hierarchy of EAP-based authentication is kept unchanged.

After deriving the MSK, the AS sends it back to the tASN. The KEY_REQ and the delivery of the MSK are protected using RADIUS-key wrap, which can be found in [18]. Meanwhile, the MS can derive the MSK using the same formula. After the above steps, the MS and the tASN share the same MSK to compute the AKand can start the SA-TEK 3-way handshake immediately after the ranging process. By using the SKEP, the long delay caused by EAP-based authentication can be omitted, thus making the HO significantly faster.

4 Formal verification

The BAN logic [19] is used for formal verification of SKEP. The BAN logic is a popular formal method to analyze and verify authentication protocols. By the BAN logic, the verification of the protocol follows three stages. The first stage is to transform the original protocol into an idealized one where the message exchange is expressed as a sequence of formal steps. The syntax for each formal step is \(\hbox {A}\rightarrow \hbox {B}\): X, where A and B are the communicating entities and X is a statement. The second stage is to identify and formally express the assumptions under the initial state of the protocol. The final step is to iteratively apply logical postulates using the given initial assumptions until meaningful results are obtained. The notation used throughout our verification follows the guideline in [19]. Since the BAN logic provides no notation and rule for the HMAC operation, we use \(\langle \mathrm{P} \rangle _\mathrm{K}\) to express \(\mathrm{HMAC_K} (\mathrm{P})\).

4.1 Idealization of the protocol

The idealization of the protocol’s message exchanges follows closely the syntax described previously. The hASN and the hBS are included in the protocol idealization so that we can verify the possibility of attacks on these entities. The PMS has been replaced by the statement that the PMS is a shared secret between the MS and the AS. \(\hbox {ID}_{\hbox {MS}}\) is omitted since it is a plain text which does not contribute to the logical properties of the protocol. However, the plain texts nonce \(\mathrm{N_{MS}}\) and \(\mathrm{N_{AS}}\) are still included since they are required for the generation of the MSK. Besides, it is also necessary to verify that both of the MS and the AS have the same nonce at the end of the pre-authentication process. PMS+1 is changed to PMS because the purpose of adding 1 to PMS is to prevent the same cipher text to be sent in the request and response message. The differentiation between two cipher text is reflected in the idealization in the “from” field.

  • M1:

  • M2:

  • M3:

  • M4:

4.2 Establishment of initial assumption

The initial assumptions are as followed:

  • A11: MS believes MS \(\overset{\mathrm{PIK1}}{\longleftrightarrow }\,\hbox {hBS}\)

  • A12: hBSbelieves MS \(\overset{\mathrm{PIK1}}{\longleftrightarrow }\,\hbox {hBS}\)

  • A21: MS believes MS \(\overset{\mathrm{PIK2}}{\longleftrightarrow }\,\hbox {hASN}\)

  • A22: hASN believes MS \(\overset{\mathrm{PIK2}}{\longleftrightarrow }\,\hbox {hASN}\)

  • A23: MS believes MS \(\overset{\mathrm{PIK2}}{\longleftrightarrow }\,\hbox {AS}\)

  • A24: AS believes MS \(\overset{\mathrm{PIK2}}{\longleftrightarrow }\,\hbox {AS}\)

  • A31: MS believes MS \(\overset{\mathrm{PEK}}{\longleftrightarrow }\,\hbox {AS}\)

  • A32: AS believes MS \(\overset{\mathrm{PEK}}{\longleftrightarrow }\,\hbox {AS}\)

  • A41:

  • A42: MS believes \(\hbox {N}_{\mathrm{MS}}\)

  • A43: AS believes \(\hbox {N}_{\mathrm{AS}}\)

  • A51:

  • A61: MS believesfresh (SN)

  • A62: hBS believesfresh (SN)

  • A63: hASN believesfresh (SN)

  • A64: AS believes fresh (SN)

The first group of two assumptions (A11, A12) indicates that PIK1 is a shared secret key known by the MS and the BS. Although PIK1 is known by the hASN, since it is not used by this entity, there is no need to include this fact in the assumptions. The second group of 4 assumptions (A21–A24) indicates that PIK2 is a shared secret among the MS, the hASN, and the AS. The assumptions in the third group (A31, A32) indicate that PEK is only shared between the MS and the AS. Fourth group assumptions indicate that the MS knows the shared secret PMS between the MS and the AS. And the MS and the AS each generate a nonce, namely the \(\hbox {N}_{\mathrm{MS}} \) and the \(\hbox {N}_{\mathrm{AS}} \), respectively. The assumption A51 shows that the AS trusts the MS to generate a good shared secret PMS. The last group (A61–A64) indicates that the freshness of the SN can be checked by all four communication entities.

4.3 Analysis of the protocol

After the idealized protocol and the initial assumptions are defined, the protocol can be analyzed as follows.

From M1, we can derive:

  1. (1)

    , by Annotation rule

  2. (2)

    , by Message Meaning rule, using (1) and A12

  3. (3)

    , by Nonce Verification rule, using (2) and A62

From M2, we derive:

  1. (4)

    , by Annotation rule

  2. (5)

    , by Message Meaning rule, using (4) and A24

  3. (6)

    , by Nonce Verification rule, using (5) and A64

  4. (7)

    , by Belief Conjuncatenation rule, using (6) and A32

  5. (8)

    , by Jurisdiction rule, using (7) and A51

  6. (9)

    AS believes MS believes \(\hbox {N}_{\mathrm{MS}}\), by Belief Conjuncatenation rule, using (8) and A32

Following the similar steps of the deduction from M1 and M2, we can obtain the final results of the other two messages as follows.

It is shown from the above results that SKEP has achieved the ultimate goals of an authentication protocol. First, the PMS is verified to be the secret shared only between the MS and the AS which implies that no party except the MS and the AS knows or can deduce this secret. At the end of the pre-authentication process, both the MS and the AS have confirmed their possession of the PMS. The final two deductions indicate that both the MS and the AS possess the same nonce \(\hbox {N}_{\mathrm{MS}}\) and \(\hbox {N}_{\mathrm{AS}}\).

On the other hand, we also derive that

  • From M1:

  • From M2:

  • From M3:

  • From M4:

Table 3 Number of cryptographic operations

These derivation results show that it is not possible to perform the replay attack on any of these four messages. For the MSK key exchanged between the tASN and the AS, the security is guaranteed because it is protected using the RADIUS key wrap protocol, which has been used widely for the delivery of keying material from the server to the authenticator.

5 Performance evaluation

5.1 Performance analysis of the pre-authentication process

When analyzing the performance of pre-authentication-based protocols, two most important factors to be considered are the number of cryptographic operations and the pre-authentication latency. The former factor defines how much computational resource has been consumed by the communication entities during the pre-authentication process as cryptographic operations are the main source of computational resource consumption. The latter factor defines how fast this process is. The faster the pre-authentication process, the higher possibility that the MS successfully exchanges the PMS with the AS before a HO happens. In this paper, we compare the SKEP with two other protocols, the EPA and the EEP.

5.1.1 Number of cryptographic operations

Cryptographic operations include the digital signature and verification, the certificate validation, the hash function, which is used to calculate the HMAC in the EEP and the SKEP, the encryption and decryption. In this analysis, the RSA-1024 algorithm is used to calculate digital signatures and for the public key encryption used in the EEP and the EPA. AES/CTR-128 is used for encryption of PMS in the SKEP. The number of nASNs is n.

The number of cryptographic operations is shown in Table 3. Compared to the EPA scheme which has the number of cryptographic functions performed by the hASN and the MS increases linearly with the number of nASNs, the EEP and the SKEP schemes provide a consistent performance with a constant and minimum number of cryptographic functions. The reason behind this improvement is that the EEP and the SKEP allow the MS to exchange keying materials with the AS and the AS will be responsible to distribute the MSK to the tASN upon the confirmation of a HO. Thus, they overcome the main drawback of the pre-authentication approach, which is that the MS wastes unnecessary power for the key exchange with other nASNs that it may never roam to. Similarly, the other nASNs would not waste their resources for the extra key exchanges.

Moreover, another enhancement of the SKEP compared to the EAP-TLS authentication as well as the EPA and the EEP schemes is that our proposed scheme makes use of symmetric key cryptography and hash function to protect the pre-authentication message exchange, which requires much less computational resource compared to the heavy public key operations such as certificates verifications, signature signing, and verifications involved in the two other schemes. As mentioned before, the public key cryptographic operations consume great computational resource and processing power of the communication entities especially for the MS, because of the limited processing power due to its small physical size and less battery capacity. The computation required by public key cryptographic operations, especially digital signature operations and decryption [20], can significantly affect performance of the MS’s other functions. Instead of performing 3 public key cryptographic operations and 1 hash function as the EEP, which would take several milliseconds, or even worse, 4n operations as the EPA, the SKEP only requires the MS to perform 3 hash functions and 2 symmetric cryptographic operations, which takes only several microseconds. This can effectively reduce the pre-authentication latency, which will be calculated in the next section.

5.1.2 Pre-authentication latency

The pre-authentication latency determines how fast the pre-authentication process can complete. It should be noted that the MS can perform pre-authentication and normal data transmission at the same time. Denoted as \(\mathrm{l_{PREAUTH}}\), it can be defined as the time elapsed between the moment of the transmission of the first pre-authentication message (the NBL message by the EPA, the PREAUTH_INIT message by the EEP and the PREAUTH_REQ message by the SKEP) until the moment of the reception of the last PREAUTH_RSP message. It consists of the delay of the computing process and the transmission and propagation delays of all pre-authentication messages. To evaluate the delay of the computing process, which is the time used for the cryptographic operations, we make use of the speed benchmark provided in [21] for the hBS, the hASN and the AS. We assume that the MS’s processing power is half of the hBS’s. The HMAC calculation delay for the EEP and the SKEP is different due to the different sizes of the input to the hash function.

In order to calculate the transmission delay, we make some assumptions to the network parameters. The uplink and downlink data rates are assumed to be 1.68 and 3.744 Mbps, respectively. All backbone connections among the BS, the ASN-GWs, and the AS are via wired links with bandwidth of 1000 Mbps. Each certificate has the size of 1 KB. All the messages are management messages, which include 6 bytes of MAC header, 14 bytes of Ethernet header, 20 bytes of IP header, 8 bytes of UDP header, 1 byte of management message type, 4 bytes of CRC, and other TLV attributes. Based on this, we can construct the size of each pre-authentication message and the total transmission time. The notation and corresponding values are summarized in Table 4.

Table 4 Notation in the expressions of pre-authentication latency

For the EPA, the pre-authentication finishes when all secret keys are delivered from nASNs to the MS:

$$\begin{aligned} \mathrm{l_{PREAUTH\_EPA}}= & {} n\times \left( \mathrm {t_{cert\_MS} +t_{RSAenc\_MS} +t_{RSAdec\_MS} +t_{sign\_MS} +t_{ver\_MS} } \right) \nonumber \\&+\left( {2n+1} \right) \times \mathrm{t_{ver\_ASN} +t_{RSAenc\_ASN} +t_{RSAdec\_ASN}} +\mathrm{t_{sign\_ASN}} \nonumber \\&+\,(n+2)\times \mathrm{d_{MS-BS} }+\left( {n+1} \right) \times \left( \mathrm{{d_{BS-ASN} +d_{ASN} } }\right) +\mathrm{T_{EPA}}\nonumber \\= & {} 80.93 \end{aligned}$$
(11)

For the EEP and the SKEP, the PREAUTH_RSP message sent by the AS serves as the acknowledgement message to complete the pre-authentication. The pre-authentication latency is calculated as followed:

$$\begin{aligned} \mathrm{l_{PREAUTH\_EEP}}= & {} \mathrm{t_{EEP\_HMAC\_MS} +t_{RSAenc\_MS} +t_{sign\_MS} +t_{ver\_MS}}\nonumber \\&+\,\mathrm{t_{EEP\_HMAC\_BS} +3\times t_{ver\_AS} +t_{RSAdec\_AS} +t_{sign\_AS} +3\times d_{MS-BS}}\nonumber \\&+\,2\times ( \mathrm {{d_{BS-ASN} +d_{ASN-AS} }})+\mathrm{T_{EEP} =21.76\,ms }\end{aligned}$$
(12)
$$\begin{aligned} \mathrm{l_{PREAUTH\_SKEP}}= & {} 3\times \mathrm{t_{SKEP\_HMAC\_MS} +2\times t_{AES\_MS}}\nonumber \\&+\,4\times \mathrm{t_{SKEP\_HMAC\_BS} +2\times t_{AES\_AS}}\nonumber \\&+\,2\times (\mathrm{d_{MS-BS} +d_{BS-ASN} +d_{ASN-AS} })+\mathrm{T_{SKEP} =5.13\,ms}\nonumber \\ \end{aligned}$$
(13)

As shown in (Eqs. 11, 12 and 13), the proposed SKEP scheme has reduced significantly the total processing time for cryptographic operations compared to the EPA and the EEP scheme by using symmetric cryptography instead of public key cryptography. The SKEP scheme only requires one round trip of message exchange between the MS and the AS, while the EEP requires additional message sent from the BS to the MS to initialize the pre-authentication process and the EPA requires n round trips between the MS and the nASNs. Not only that, the number of bits of information exchanged over the air is the smallest by the SKEP scheme since there is no certificate and only one key transmitted. As the result, SKEP has the shortest total transmission time as well as the shortest propagation delay among the three schemes.

In short, the pre-authentication latency has been significantly reduced by the SKEP scheme, more than 75 % compared to the EEP scheme and more than 90 % compared to the EPA scheme in the case of 5 nASNs. As explained before, it is extremely critical for a pre-authentication-based HO, as it is only successful if the pre-authentication can be completed before the HO starts. The shorter the pre-authentication latency is, the higher the possibility that the HO is successful.

5.2 Handover latency

During HO, the difference between SKEP and other pre-authentication schemes such as the EPA, the EEP, and the HOEA is the one additional exchange of MSK between the tASN and the AS upon the confirmation of HO, which is necessary to omit the consumption of communication resources required for distributing keying materials to possible nASNs that the MS may never roam to. However, this addition key exchange is performed in parallel with the HO synchronization and ranging process between the MS and the tBS. The recommended setting for a ranging duration in a HO is around 20 ms [22], which is longer than the time required for the MSK key exchange, which requires less than 10 ms. Thus, the additional key exchange will not introduce any extra delay to the HO latency. As the result, the HO latency of the SKEP is the same as that of other pre-authentication-based schemes such as the EPA, the EEP, and the HOEA. The common and most significant contribution of pre-authentication-based schemes is that they totally omit the long authentication latency of the full EAP authentication from the total HO latency. As the result, the authentication latency in HO is only the time required for the SA-TEK 3-way handshakes. Compared to re-authentication-based schemes such as the ERP which still require single or several round trips of authentication message exchange, our scheme still provides shorter HO latency.

6 Conclusion

In this paper, a pre-authentication scheme, SKEP, is proposed to reduce the authentication delay in the HO for the Mobile WiMAX networks. The proposed scheme uses symmetric key encryption for the delivery of the secret key, the mutual authentication of the MS and the AS, and the integrity protection of the pre-authentication messages. The SKEP is formally verified by the BAN logic and is proven to achieve high level of security and robustness. Through comparing with other pre-authentication schemes EPA and EEP, the SKEP has shown significant improvement in efficient usage of computational resources and in reducing the pre-authentication delay while keeping the minimum HO delay. We believe that the proposed authentication scheme is both secure and efficient, which makes it to be a competitive candidate for the efficient HO schemes.