Skip to main content
Erschienen in: Wireless Personal Communications 3/2020

19.05.2020

A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications

verfasst von: Guangsong Li, Yongbin Zeng, Hui Guang, Gang Yu

Erschienen in: Wireless Personal Communications | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A fast handover authentication protocol takes an important role for delay-sensitive applications in wireless networks. Mobile users may be granted different priorities depending on communication fees they paid. In this paper, we present a priority-aware anonymous handover authentication protocol using attribute-based cryptography. The proposed protocol realizes mutual authentication, user anonymity, session key establishment and user revocation etc. Particularly it obtains a charming property, namely, user priority. Compared with some existing schemes, it is more efficient while satisfying security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mishra, A., Shin, M., & Arbaugh, W. (2003). An empirical analysis of the IEEE 802.11 MAC layer handoff process. ACM. Mishra, A., Shin, M., & Arbaugh, W. (2003). An empirical analysis of the IEEE 802.11 MAC layer handoff process. ACM.
2.
Zurück zum Zitat Duan, X., & Wang, X. (2015). Authentication handover and privacy protection in 5G hetnets using software-defined networking. Communications Magazine IEEE, 53(4), 28–35.CrossRef Duan, X., & Wang, X. (2015). Authentication handover and privacy protection in 5G hetnets using software-defined networking. Communications Magazine IEEE, 53(4), 28–35.CrossRef
3.
Zurück zum Zitat Fu, A., Zhang, G., Yu, Y., & Zhu, Z. (2014). A privacy preserving vertical handover authentication scheme for WiMAX-WiFi networks. Ksii Transactions on Internet & Information Systems, 8(9), 3250–3265. Fu, A., Zhang, G., Yu, Y., & Zhu, Z. (2014). A privacy preserving vertical handover authentication scheme for WiMAX-WiFi networks. Ksii Transactions on Internet & Information Systems, 8(9), 3250–3265.
4.
Zurück zum Zitat Kumar, A., & Om, H. (2016). A secure seamless handover authentication technique for wireless LAN. In International conference on information technology, 2016 (pp. 43–47). Kumar, A., & Om, H. (2016). A secure seamless handover authentication technique for wireless LAN. In International conference on information technology, 2016 (pp. 43–47).
5.
Zurück zum Zitat Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks. Sensors, 14(7), 11379–11394.CrossRef Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks. Sensors, 14(7), 11379–11394.CrossRef
6.
Zurück zum Zitat He, D., Khan, M. K., & Kumar, N. (2015). A new handover authentication protocol based on bilinear pairing functions for wireless networks. International Journal of Ad Hoc and Ubiquitous Computing, 18(1/2), 67–74.CrossRef He, D., Khan, M. K., & Kumar, N. (2015). A new handover authentication protocol based on bilinear pairing functions for wireless networks. International Journal of Ad Hoc and Ubiquitous Computing, 18(1/2), 67–74.CrossRef
7.
Zurück zum Zitat He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications, 10(2), 431–436.CrossRef He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications, 10(2), 431–436.CrossRef
8.
Zurück zum Zitat Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., & Sun, X. (2015). Enhanced secure sensor association and key management in wireless body area networks. Journal of Communications & Networks, 17(5), 453–462.CrossRef Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., & Sun, X. (2015). Enhanced secure sensor association and key management in wireless body area networks. Journal of Communications & Networks, 17(5), 453–462.CrossRef
9.
Zurück zum Zitat Wang, D., Wang, N., Wang, P., & Qing, S. (2015). Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Information Sciences, 321, 162–178.CrossRef Wang, D., Wang, N., Wang, P., & Qing, S. (2015). Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Information Sciences, 321, 162–178.CrossRef
10.
Zurück zum Zitat He, D., Wang, D., Xie, Q., & Chen, K. (2017). Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation. Science China Information Sciences, 60(5), 052104.CrossRef He, D., Wang, D., Xie, Q., & Chen, K. (2017). Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation. Science China Information Sciences, 60(5), 052104.CrossRef
11.
Zurück zum Zitat He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef
12.
Zurück zum Zitat Yang, G., Wong, D. S., & Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 3461–3472.CrossRef Yang, G., Wong, D. S., & Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 3461–3472.CrossRef
13.
Zurück zum Zitat He, D., Chan, S., Chen, C., Bu, J., & Fan, R. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465–476.CrossRef He, D., Chan, S., Chen, C., Bu, J., & Fan, R. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465–476.CrossRef
14.
Zurück zum Zitat Zhang, M., & Fang, Y. (2005). Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications, 4(2), 734–742.CrossRef Zhang, M., & Fang, Y. (2005). Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications, 4(2), 734–742.CrossRef
15.
Zurück zum Zitat Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.CrossRef Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.CrossRef
16.
Zurück zum Zitat He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRef He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRef
17.
Zurück zum Zitat Li, G., Jiang, Q., Wei, F., & Ma, C. (2014). A new privacy-aware handover authentication scheme for wireless networks. Wireless Personal Communications, 80(2), 581–589.CrossRef Li, G., Jiang, Q., Wei, F., & Ma, C. (2014). A new privacy-aware handover authentication scheme for wireless networks. Wireless Personal Communications, 80(2), 581–589.CrossRef
18.
Zurück zum Zitat Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011) A privacy preserving handover authentication scheme for EAP-based wireless networks. In Global telecommunications conference, 2011 (pp. 1–6). Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011) A privacy preserving handover authentication scheme for EAP-based wireless networks. In Global telecommunications conference, 2011 (pp. 1–6).
19.
Zurück zum Zitat He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.CrossRef He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.CrossRef
20.
Zurück zum Zitat Yeo, S. L., Yap, W. S., Liu, J. K., & Henricksen, M. (2013). Comments on “Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions”. IEEE Communications Letters, 17(8), 1521–1523.CrossRef Yeo, S. L., Yap, W. S., Liu, J. K., & Henricksen, M. (2013). Comments on “Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions”. IEEE Communications Letters, 17(8), 1521–1523.CrossRef
21.
Zurück zum Zitat Jo, H. J., Paik, J. H., & Dong, H. L. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469–1481.CrossRef Jo, H. J., Paik, J. H., & Dong, H. L. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469–1481.CrossRef
22.
Zurück zum Zitat Sultan, N. H., & Sarma, N. (2014). PAPAR: Pairing based authentication protocol with anonymous roaming for wireless mesh networks. In International conference on information technology, 2014 (pp. 155–160). Sultan, N. H., & Sarma, N. (2014). PAPAR: Pairing based authentication protocol with anonymous roaming for wireless mesh networks. In International conference on information technology, 2014 (pp. 155–160).
23.
Zurück zum Zitat Kwon, H., Kim, D., Hahn, C., & Hur, J. (2016). Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimedia Tools & Applications, 2016, 1–15. Kwon, H., Kim, D., Hahn, C., & Hur, J. (2016). Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimedia Tools & Applications, 2016, 1–15.
24.
Zurück zum Zitat Alpár, G., Batina, L., Batten, L., Moonsamy, V., Krasnova, A., et al. (2016) New directions in IoT privacy using attribute-based authentication. In ACM international conference on computing frontiers, 2016 (pp. 461–466). Alpár, G., Batina, L., Batten, L., Moonsamy, V., Krasnova, A., et al. (2016) New directions in IoT privacy using attribute-based authentication. In ACM international conference on computing frontiers, 2016 (pp. 461–466).
25.
Zurück zum Zitat Boneh, D., Boyen, X., & Goh, E.-J. (2005). Hierarchical identity based encryption with constant size ciphertext. In Annual international conference on the theory and applications of cryptographic techniques, 2005 (pp. 440–456). Springer. Boneh, D., Boyen, X., & Goh, E.-J. (2005). Hierarchical identity based encryption with constant size ciphertext. In Annual international conference on the theory and applications of cryptographic techniques, 2005 (pp. 440–456). Springer.
26.
Zurück zum Zitat Sahai, A., & Waters, B. (2005) Fuzzy identity-based encryption. In International conference on theory and applications of cryptographic techniques, 2005 (pp. 457–473). Sahai, A., & Waters, B. (2005) Fuzzy identity-based encryption. In International conference on theory and applications of cryptographic techniques, 2005 (pp. 457–473).
27.
Zurück zum Zitat Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006) Attribute-based encryption for fine-grained access control of encrypted data. In ACM conference on computer and communications security, 2006 (pp. 89–98). Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006) Attribute-based encryption for fine-grained access control of encrypted data. In ACM conference on computer and communications security, 2006 (pp. 89–98).
28.
Zurück zum Zitat Chen, C., Zhang, Z., & Feng, D. (2011). Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. Berlin: Springer Berlin Heidelberg.CrossRef Chen, C., Zhang, Z., & Feng, D. (2011). Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. Berlin: Springer Berlin Heidelberg.CrossRef
29.
Zurück zum Zitat Ansi, X. (1999). Public Key cryptography for the financial services industry: The elliptic curve digital signature algorithm (ECDSA). Ansi, X. (1999). Public Key cryptography for the financial services industry: The elliptic curve digital signature algorithm (ECDSA).
Metadaten
Titel
A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications
verfasst von
Guangsong Li
Yongbin Zeng
Hui Guang
Gang Yu
Publikationsdatum
19.05.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07492-y

Weitere Artikel der Ausgabe 3/2020

Wireless Personal Communications 3/2020 Zur Ausgabe

Neuer Inhalt