{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T22:17:30Z","timestamp":1772576250879,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,5,24]],"date-time":"2020-05-24T00:00:00Z","timestamp":1590278400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,5,24]],"date-time":"2020-05-24T00:00:00Z","timestamp":1590278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users\/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN, and WiMAX-Advanced (WiMAX-A) interworking architecture. The proposed protocols are applicable to 5G networks. With the consideration of the existing standard authentication protocols, a new set of authentication and re-authentication protocols has been reinvented to provide fast and secure handovers (HO) in the current 4G and the next 5G networks. The proposed authentication protocols can be invoked when the users perform a vertical HO (between different networks) for the first time, whereas the re-authentication protocols can be invoked when the users perform a horizontal HO (within the same network domain). These protocols provide an efficient method to protect user identity and reduce the burden on the authentication server (AS) during the sequential handovers. The results of the analytical model show that the proposed protocols achieve better performance than standard and other protocols. The reduction of handover cost, handover delay, and energy consumption in the proposed protocols reaches up to 22%, 44%, and 17%, respectively. In addition, the verification tools show that the proposed protocols are secure, dependable, and prevent all types of authentication and secrecy attacks.<\/jats:p>","DOI":"10.1186\/s13638-020-01702-8","type":"journal-article","created":{"date-parts":[[2020,5,24]],"date-time":"2020-05-24T08:02:32Z","timestamp":1590307352000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Efficient authentication and re-authentication protocols for 4G\/5G heterogeneous networks"],"prefix":"10.1186","volume":"2020","author":[{"given":"Kamal Ali","family":"Alezabi","sequence":"first","affiliation":[]},{"given":"Fazirulhisyam","family":"Hashim","sequence":"additional","affiliation":[]},{"given":"Shaiful J.","family":"Hashim","sequence":"additional","affiliation":[]},{"given":"Borhanuddin M.","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Abbas","family":"Jamalipour","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,24]]},"reference":[{"key":"1702_CR1","volume-title":"Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA\u2019), RFC 5448","author":"J. Arkko","year":"2009","unstructured":"J. Arkko, V. Lehtovirta, P. Eronen, Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA\u2019), RFC 5448 (IETF, USA, 2009)."},{"key":"1702_CR2","volume-title":"3GPP system architecture evolution (SAE); Security aspects of non-3GPP accesses. TS 33.402 V13.1.0","author":"3GPP","year":"2016","unstructured":"3GPP, 3GPP system architecture evolution (SAE); Security aspects of non-3GPP accesses. TS 33.402 V13.1.0 (3GPP, France, 2016)."},{"key":"1702_CR3","volume-title":"Remote Authentication Dial In User Service, RFC 2865","author":"C. Rigney","year":"2000","unstructured":"C. Rigney, S. Willens, A. Rubens, W. Simpson, Remote Authentication Dial In User Service, RFC 2865 (IETF, USA, 2000)."},{"key":"1702_CR4","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1109\/MICC.2013.6805864","volume-title":"IEEE Malaysia International Conference on Communications (MICC 2013)","author":"K. A. Alezabi","year":"2013","unstructured":"K. A. Alezabi, F. Hashim, S. J. Hashim, B. M. Ali, in IEEE Malaysia International Conference on Communications (MICC 2013). A new tunnelled EAP based authentication method for WIMAX networks (IEEEKuala Lumpur, 2013), pp. 412\u2013417."},{"key":"1702_CR5","volume-title":"WiMAX advanced: Deployment scenarios based on input from WiMAX operators and vendors","author":"P WiMAX Forum Network Working Group","year":"2014","unstructured":"P WiMAX Forum Network Working Group, WiMAX advanced: Deployment scenarios based on input from WiMAX operators and vendors (WiMAX Forum, Clackamas, 2014)."},{"key":"1702_CR6","unstructured":"GSM, Digital cellular telecommunications system (phase 2+); Security aspects. (GSM 02.09 version 6.1.0 release 1997) (1997)."},{"key":"1702_CR7","volume-title":"3G security architecture","author":"3GPP","year":"2018","unstructured":"3GPP, 3G security architecture (3GPP, France, 2018)."},{"key":"1702_CR8","volume-title":"3GPP system architecture evolution (SAE); Security architecture","author":"3GPP","year":"2018","unstructured":"3GPP, 3GPP system architecture evolution (SAE); Security architecture (3GPP, France, 2018)."},{"key":"1702_CR9","unstructured":"3GPP, 3GPP system architecture evolution (SAE); Security architecture and procedures for 5G system (2019)."},{"issue":"12","key":"1702_CR10","doi-asserted-by":"publisher","first-page":"1478","DOI":"10.1002\/sec.413","volume":"6","author":"E. Bou-Harb","year":"2013","unstructured":"E. Bou-Harb, M. Pourzandi, M. Debbabi, C. Assi, A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. Secur. Commun. Netw.6(12), 1478\u20131489 (2013).","journal-title":"Secur. Commun. Netw."},{"key":"1702_CR11","volume-title":"Access to the evolved packet core (epc) via non-3GPP access networks; stage 3","author":"3GPP","year":"2018","unstructured":"3GPP, Access to the evolved packet core (epc) via non-3GPP access networks; stage 3 (3GPP, France, 2018)."},{"key":"1702_CR12","first-page":"27","volume":"1","author":"PUB FIPS","year":"2008","unstructured":"PUB FIPS, 180-3. Secure hash standard. Natl. Inst. Stand. Technol.1:, 27 (2008).","journal-title":"Natl. Inst. Stand. Technol."},{"key":"1702_CR13","first-page":"45","volume":"17","author":"P. FIPS","year":"1995","unstructured":"P. FIPS, 180-1. Secure hash standard. Natl. Inst. Stand. Technol.17:, 45 (1995).","journal-title":"Natl. Inst. Stand. Technol."},{"issue":"4","key":"1702_CR14","doi-asserted-by":"publisher","first-page":"ett.3031","DOI":"10.1002\/ett.3031","volume":"28","author":"K. A. Alezabi","year":"2017","unstructured":"K. A. Alezabi, F. Hashim, S. J. Hashim, B. M. Ali, A. Jamalipour, On the authentication and re-authentication protocols in lte-wlan interworking architecture. Trans. Emerg. Telecommun. Technol.28(4), ett.3031 (2017).","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"1702_CR15","volume-title":"3GPP system architecture evolution (SAE); Security aspects of non-3GPP accesses (rel 14)","author":"3GPP","year":"2017","unstructured":"3GPP, 3GPP system architecture evolution (SAE); Security aspects of non-3GPP accesses (rel 14) (3GPP, France, 2017)."},{"issue":"7","key":"1702_CR16","first-page":"101","volume":"2014","author":"S. -S. Shen","year":"2014","unstructured":"S. -S. Shen, S. -H. Lin, J. -H. Chiu, Fast handover pre-authentication protocol in 3GPP-WLAN heterogeneous mobile networks. Int. J. Commun. Netw. Syst. Sci.2014(7), 101\u2013113 (2014).","journal-title":"Int. J. Commun. Netw. Syst. Sci."},{"issue":"2","key":"1702_CR17","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s12652-011-0072-0","volume":"4","author":"S. -H. Lin","year":"2013","unstructured":"S. -H. Lin, J. -H. Chiu, S. -S. Shen, The performance evaluation of fast iterative localized re-authentication for 3G\/UMTS-WLAN interworking networks. J. Ambient. Intell. Humanized Comput.4(2), 209\u2013221 (2013).","journal-title":"J. Ambient. Intell. Humanized Comput."},{"issue":"8","key":"1702_CR18","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/s12046-018-0891-1","volume":"43","author":"G. Singh","year":"2018","unstructured":"G. Singh, D. Shrimankar, A privacy-preserving authentication protocol with secure handovers for the LTE\/LTE-A networks. S\u0101dhan\u0101. 43(8), 128 (2018).","journal-title":"S\u0101dhan\u0101"},{"key":"1702_CR19","doi-asserted-by":"crossref","unstructured":"J. Arkko, H. Haverinen, Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA), RFC 4187 (USA, 2006).","DOI":"10.17487\/rfc4187"},{"key":"1702_CR20","doi-asserted-by":"crossref","unstructured":"Y. El Hajjaji El Idrissi, N. Zahid, M. Jedra, in 20th International Conference on Telecommunications (ICT 2013). A new fast re-authentication method for the 3G-WLAN interworking based on EAP-AKA (IEEE, 2013), pp. 1\u20135.","DOI":"10.1109\/ICTEL.2013.6632107"},{"issue":"19","key":"1702_CR21","first-page":"20","volume":"61","author":"A. H. Hassanein","year":"2013","unstructured":"A. H. Hassanein, A. Hafez, A. Ahmed, A. Gaafar, A. El-hamid, New authentication and key agreement protocol for LTE-WLAN interworking. Int. J. Comput. Appl.61(19), 20\u201324 (2013).","journal-title":"Int. J. Comput. Appl."},{"key":"1702_CR22","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1109\/TENCONSpring.2014.6863085","volume-title":"IEEE Region 10 Symposium 2014","author":"K. A. Alezabi","year":"2014","unstructured":"K. A. Alezabi, F. Hashim, S. J. Hashim, B. M. Ali, in IEEE Region 10 Symposium 2014. An efficient authentication and key agreement protocol for 4g (LTE) networks (IEEEKuala Lumpur, 2014), pp. 502\u2013507."},{"issue":"5","key":"1702_CR23","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1109\/TDSC.2010.39","volume":"8","author":"A. A. Al Shidhani","year":"2011","unstructured":"A. A. Al Shidhani, V. C. Leung, Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN handovers. IEEE Trans. Dependable Secure Comput.8(5), 699\u2013713 (2011).","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1702_CR24","doi-asserted-by":"crossref","unstructured":"E. Sithirasenan, K. Ramezani, S. Kumar, V. Muthukkumarasamy, EAP-CRA for WiMAX, WLAN and 4G LTE interoperability. Selected Topics in WiMAX, IntechOpen, 978\u2013953 (2013).","DOI":"10.5772\/54837"},{"key":"1702_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2017.11.009","volume":"102","author":"J. Cao","year":"2018","unstructured":"J. Cao, M. Ma, H. Li, Y. Fu, X. Liu, EGHR: Efficient group-based handover authentication protocols for MMTC in 5G wireless networks. J. Netw. Comput. Appl.102:, 1\u201316 (2018).","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"1702_CR26","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1186\/s13638-018-1217-z","volume":"2018","author":"D. Wang","year":"2018","unstructured":"D. Wang, L. Xu, F. Wang, Q. Xu, An anonymous batch handover authentication protocol for big flow wireless mesh networks. EURASIP J. Wirel. Commun. Netw.2018(1), 200 (2018).","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"1702_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/9781118380642","volume-title":"LTE Security, vol. 1","author":"D. Forsberg","year":"2012","unstructured":"D. Forsberg, G. Horn, W. -D. Moeller, V. Niemi, LTE Security, vol. 1 (Wiley, New York, 2012)."},{"key":"1702_CR28","volume-title":"The Kerberos version 5 GSS-API mechanism. RFC 1964","author":"J. Linn","year":"1996","unstructured":"J. Linn, The Kerberos version 5 GSS-API mechanism. RFC 1964 (IETF, USA, 1996)."},{"key":"1702_CR29","volume-title":"WiMAX forum network architecture\u2014stage 2 \u201carchitecture tenets, reference model and reference points 3GPP\u2014WiMAX interworking,\u201d rel 2","author":"P. WiMAX Forum Network Working Group","year":"2011","unstructured":"P. WiMAX Forum Network Working Group, WiMAX forum network architecture\u2014stage 2 \u201carchitecture tenets, reference model and reference points 3GPP\u2014WiMAX interworking,\u201d rel 2 (WiMAX Forum, Clackamas, 2011)."},{"key":"1702_CR30","doi-asserted-by":"crossref","unstructured":"R. Housley, B. Aboba, Guidance for Authentication, Authorization, and Accounting (AAA) KeyManagement. RFC4962 (2007).","DOI":"10.17487\/rfc4962"},{"key":"1702_CR31","unstructured":"IEEE Standard for local and metropolitan area networks, et al., Air Interface for Fixed Broadband Wireless Access Systems, Part 16, Amendment 2 and Corrigendum 1 (2005). IEEE Std 802.16e-2005 and IEEE Std 802.16-2004\/Cor1-2005."},{"key":"1702_CR32","volume-title":"802.11 Wireless LAN Fundamentals","author":"P. Roshan","year":"2004","unstructured":"P. Roshan, J. Leary, 802.11 Wireless LAN Fundamentals (Cisco press, Indiana, 2004)."},{"key":"1702_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2011-1","volume":"2011","author":"X. Li","year":"2011","unstructured":"X. Li, J. Ma, Y. Park, L. Xu, A USIM-based uniform access authentication framework in mobile communication. EURASIP J. Wirel. Comm. Netw.2011:, 1\u201312 (2011).","journal-title":"EURASIP J. Wirel. Comm. Netw."},{"key":"1702_CR34","volume-title":"Handover Key Management and Re-Authentication Problem Statement. RFC 5169","author":"T. Clancy","year":"2008","unstructured":"T. Clancy, M. Nakhjiri, V. Narayanan, L. Dondeti, Handover Key Management and Re-Authentication Problem Statement. RFC 5169 (IETF, USA, 2008)."},{"issue":"2","key":"1702_CR35","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/s12083-014-0251-9","volume":"8","author":"T. Yang","year":"2015","unstructured":"T. Yang, C. Lai, R. Lu, R. Jiang, EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks. Peer-to-Peer Netw. Appl.8(2), 216\u2013228 (2015).","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"1702_CR36","doi-asserted-by":"crossref","unstructured":"R. Housley, B. Aboba, Guidance for Authentication, Authorization, and Accounting (AAA) Key Management (IETF, 2007).","DOI":"10.17487\/rfc4962"},{"key":"1702_CR37","unstructured":"AVISPA, The AVISPA User Manual (2001). http:\/\/www.avispa-project.org. Accessed 19 Apr 2019."},{"issue":"2","key":"1702_CR38","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1109\/TDSC.2017.2764083","volume":"17","author":"Mohammad Wazid","year":"2020","unstructured":"M. Wazid, A. K. Das, V. Odelu, N. Kumar, Susilo, Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans. Dependable Secure Comput., 1\u20131 (2017). https:\/\/doi.org\/10.1109\/TDSC.2017.2764083.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"1","key":"1702_CR39","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/s11277-012-0828-7","volume":"71","author":"K. -L. Huang","year":"2013","unstructured":"K. -L. Huang, K. -H. Chi, J. -T. Wang, C. -C. Tseng, A fast authentication scheme for WiMAX\u2013WLAN vertical handover. Wirel. Pers. Commun.71(1), 555\u2013575 (2013).","journal-title":"Wirel. Pers. Commun."},{"key":"1702_CR40","volume-title":"Queueing Systems: Volume 2: Computer Applications","author":"L. Kleinrock","year":"1976","unstructured":"L. Kleinrock, Queueing Systems: Volume 2: Computer Applications (Wiley, New York, 1976)."},{"key":"1702_CR41","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1109\/ISA.2008.75","volume-title":"International Conference on Information Security and Assurance (ISA 2008)","author":"J. -H. Lee","year":"2008","unstructured":"J. -H. Lee, T. -M. Chung, in International Conference on Information Security and Assurance (ISA 2008). A traffic analysis of authentication methods for proxy mobile ipv6 (IEEENW Washington, 2008), pp. 512\u2013517."},{"key":"1702_CR42","doi-asserted-by":"crossref","unstructured":"W. Wang, I. F. Akyildiz, in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom \u201900). Intersystem location update and paging schemes for multitier wireless networks, (2000), pp. 99\u2013109.","DOI":"10.1145\/345910.345928"},{"issue":"1","key":"1702_CR43","first-page":"1","volume":"1","author":"D. W. Carman","year":"2000","unstructured":"D. W. Carman, P. S. Kruus, B. J. Matt, Constraints and approaches for distributed sensor network security (final). DARPA Project report, (Cryptographic Technologies Group, Trusted Information System, NAI Labs). 1(1), 1\u201339 (2000).","journal-title":"DARPA Project report, (Cryptographic Technologies Group, Trusted Information System, NAI Labs)"},{"issue":"Supplement C","key":"1702_CR44","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.jnca.2015.06.022","volume":"59","author":"L. Zhang","year":"2016","unstructured":"L. Zhang, S. Tang, S. Zhu, An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. J. Netw. Comput. Appl.59(Supplement C), 126\u2013133 (2016).","journal-title":"J. Netw. Comput. Appl."},{"key":"1702_CR45","first-page":"1548","volume-title":"INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3","author":"L. M. Feeney","year":"2001","unstructured":"L. M. Feeney, M. Nilsson, in INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment (IEEEAnchorage, 2001), pp. 1548\u20131557."},{"key":"1702_CR46","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1007\/978-3-319-68179-5_43","volume-title":"International Symposium on Ubiquitous Networking","author":"Y. E. H. El Idrissi","year":"2017","unstructured":"Y. E. H. El Idrissi, N. Zahid, M. Jedra, in International Symposium on Ubiquitous Networking. An efficient authentication protocol for 5G heterogeneous networks (SpringerCasablanca, 2017), pp. 496\u2013508."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01702-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-020-01702-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01702-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,23]],"date-time":"2021-05-23T23:34:31Z","timestamp":1621812871000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-020-01702-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,24]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1702"],"URL":"https:\/\/doi.org\/10.1186\/s13638-020-01702-8","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,24]]},"assertion":[{"value":"8 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"105"}}