Skip to main content
Erschienen in: Wireless Personal Communications 2/2017

14.05.2016

Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network

verfasst von: Yong Xie, Libing Wu, Neeraj Kumar, Jian Shen

Erschienen in: Wireless Personal Communications | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To enable mobile device seamlessly and securely handover to different access points, a secure and efficient handover authentication scheme is desperately required. However, it is an arduous issue to design a secure handover scheme for wireless network because mobile nodes are limited in power and computational capability, handover latency is severely restricted and wireless network is opening and insecure. To deal the issue, we propose an improved privacy-aware handover authentication scheme for wireless network. We give the security proof to demonstrate our proposed scheme can provide mutual authentication and secure key agreement, and can resist all kinds of known security attacks. Compared with up-to-date similar handover schemes, our proposed scheme not only meets the security requirements of handover scheme, but also decreases computation cost and communication cost. Therefore, our proposed scheme is more suitable for wireless network than the similar schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Islam, S. K., & Khan, M. K. (2014). Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks. International Journal of Communication Systems. doi:10.1002/dac.2847. Islam, S. K., & Khan, M. K. (2014). Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks. International Journal of Communication Systems. doi:10.​1002/​dac.​2847.
2.
Zurück zum Zitat Fu, A., Lan, S., Huang, B., Zhu, Z., & Zhang, Y. (2012). A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks. IEEE Communications Letters, 16(11), 1744–1747.CrossRef Fu, A., Lan, S., Huang, B., Zhu, Z., & Zhang, Y. (2012). A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks. IEEE Communications Letters, 16(11), 1744–1747.CrossRef
3.
Zurück zum Zitat Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.CrossRef Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.CrossRef
4.
Zurück zum Zitat Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011). A privacy preserving handover authentication scheme for EAP-based wireless networks. In Proceedings of IEEE GLOBECOM, 2011, pp. 1–6. Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011). A privacy preserving handover authentication scheme for EAP-based wireless networks. In Proceedings of IEEE GLOBECOM, 2011, pp. 1–6.
5.
Zurück zum Zitat Hughes, D., & Shmatikov, V. (2004). Information hiding, anonymity and privacy: A modular approach. Journal of Computer security, 12(1), 3–36.CrossRef Hughes, D., & Shmatikov, V. (2004). Information hiding, anonymity and privacy: A modular approach. Journal of Computer security, 12(1), 3–36.CrossRef
6.
Zurück zum Zitat He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.CrossRef He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.CrossRef
7.
Zurück zum Zitat Li, G., Jiang, Q., Wei, F., & Ma, C. (2015). A new privacy-aware handover authentication scheme for wireless networks. Wireless Personal Communications, 80(2), 581–589.CrossRef Li, G., Jiang, Q., Wei, F., & Ma, C. (2015). A new privacy-aware handover authentication scheme for wireless networks. Wireless Personal Communications, 80(2), 581–589.CrossRef
8.
Zurück zum Zitat Xenakis, C., & Merakos, L. (2010). Security in third generation mobile networks. Computer Communications, 27(7), 638–650.CrossRef Xenakis, C., & Merakos, L. (2010). Security in third generation mobile networks. Computer Communications, 27(7), 638–650.CrossRef
9.
Zurück zum Zitat Chang, C. C., & Tsai, H. C. (2010). An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. IEEE Transactions on Wireless Communications, 9(11), 3346–3353.MathSciNetCrossRef Chang, C. C., & Tsai, H. C. (2010). An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. IEEE Transactions on Wireless Communications, 9(11), 3346–3353.MathSciNetCrossRef
10.
Zurück zum Zitat He, D., Chan, S., & Guizani, M. (2015). Handover authentication for mobile networks: Security and efficiency aspects. IEEE Network, 29(3), 96–103.CrossRef He, D., Chan, S., & Guizani, M. (2015). Handover authentication for mobile networks: Security and efficiency aspects. IEEE Network, 29(3), 96–103.CrossRef
11.
Zurück zum Zitat Yang, G., Huang, Q., Wong, D. S., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications, 9(1), 168–174.CrossRef Yang, G., Huang, Q., Wong, D. S., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications, 9(1), 168–174.CrossRef
12.
Zurück zum Zitat He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications, 10(2), 431–436.CrossRef He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications, 10(2), 431–436.CrossRef
13.
Zurück zum Zitat He, D., Bu, J., Chan, S. C., & Chen, C. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks. IEEE Transactions on Computers, 62(3), 616–622.MathSciNetCrossRef He, D., Bu, J., Chan, S. C., & Chen, C. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks. IEEE Transactions on Computers, 62(3), 616–622.MathSciNetCrossRef
14.
Zurück zum Zitat Choi, J., & Jung, S. (2010). A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters, 14(1), 54–56.CrossRef Choi, J., & Jung, S. (2010). A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters, 14(1), 54–56.CrossRef
15.
Zurück zum Zitat Shen, A. N., Guo, S., Zeng, D., & Guizani, M. (2012). A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications. In Proceeding of IEEE wireless communications and networking conference 2012 (WCNC 2012), pp. 2543–2548. Shen, A. N., Guo, S., Zeng, D., & Guizani, M. (2012). A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications. In Proceeding of IEEE wireless communications and networking conference 2012 (WCNC 2012), pp. 2543–2548.
16.
Zurück zum Zitat Yeo, S. L., Yap, W. S., Liu, J. K., & Henricksen, M. (2013). Comments on analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions. IEEE Communications Letters, 17(8), 1521–1523.CrossRef Yeo, S. L., Yap, W. S., Liu, J. K., & Henricksen, M. (2013). Comments on analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions. IEEE Communications Letters, 17(8), 1521–1523.CrossRef
17.
Zurück zum Zitat Han, Q., Zhang, Y., Chen, X., Li, H., & Quan, J. (2012). Efficient and robust identity-based handoff authentication in wireless networks. In L. Xu, E. Bertino & Y. Mu (Eds.), Network and System Security: Proceedings of the 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21–23, 2012 (pp. 180–191). Berlin, Heidelberg: Springer. Han, Q., Zhang, Y., Chen, X., Li, H., & Quan, J. (2012). Efficient and robust identity-based handoff authentication in wireless networks. In L. Xu, E. Bertino & Y. Mu (Eds.), Network and System Security: Proceedings of the 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21–23, 2012 (pp. 180–191). Berlin, Heidelberg: Springer.
18.
Zurück zum Zitat He, D., Chen, C., Bu, J., Chan, S. C., & Zhang, Y. (2013). Security and efficiency in roaming services for wireless networks: Challenges, approaches, and prospects. IEEE Communications Magazine, 51(2), 142–150.CrossRef He, D., Chen, C., Bu, J., Chan, S. C., & Zhang, Y. (2013). Security and efficiency in roaming services for wireless networks: Challenges, approaches, and prospects. IEEE Communications Magazine, 51(2), 142–150.CrossRef
19.
Zurück zum Zitat Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). Secure handover authentication protocol based on bilinear pairings. Wireless Personal Communications, 73(3), 1037–1047.CrossRef Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). Secure handover authentication protocol based on bilinear pairings. Wireless Personal Communications, 73(3), 1037–1047.CrossRef
20.
Zurück zum Zitat Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks. Sensors, 14(7), 11379–11394.CrossRef Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks. Sensors, 14(7), 11379–11394.CrossRef
21.
Zurück zum Zitat Cao, J., Ma, M., & Li, H. (2012). An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Transactions on Wireless Communications, 11(10), 3644–3650.CrossRef Cao, J., Ma, M., & Li, H. (2012). An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Transactions on Wireless Communications, 11(10), 3644–3650.CrossRef
22.
Zurück zum Zitat Fu, Z., Sun, X., Liu, Q., Zhou, L., & Shu, J. (2015). Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 98(1), 190–200.CrossRef Fu, Z., Sun, X., Liu, Q., Zhou, L., & Shu, J. (2015). Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 98(1), 190–200.CrossRef
23.
Zurück zum Zitat Xia, Z., Wang, X., Sun, X., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.CrossRef Xia, Z., Wang, X., Sun, X., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.CrossRef
24.
Zurück zum Zitat Fu, Z., Ren, K., Shu, J., Sun, X., & Huang, F. (2015). Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems. doi:10.1109/TPDS.2015.2506573. Fu, Z., Ren, K., Shu, J., Sun, X., & Huang, F. (2015). Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems. doi:10.​1109/​TPDS.​2015.​2506573.
25.
Zurück zum Zitat Lee, C., Lai, Y., Chen, C., & Chen, L. (2013). A novel designated verifier signature scheme based on bilinear pairing. Information Technology and Control, 42(3), 247–252.CrossRef Lee, C., Lai, Y., Chen, C., & Chen, L. (2013). A novel designated verifier signature scheme based on bilinear pairing. Information Technology and Control, 42(3), 247–252.CrossRef
26.
Zurück zum Zitat Ren, Y., Shen, J., Wang, J., Han, J., & Lee, S. (2015). Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 16(2), 317–323. Ren, Y., Shen, J., Wang, J., Han, J., & Lee, S. (2015). Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 16(2), 317–323.
27.
Zurück zum Zitat He, D., Huang, B., & Chen, J. (2013). New certificateless short signature scheme. IET Information Security, 7(2), 113–117.CrossRef He, D., Huang, B., & Chen, J. (2013). New certificateless short signature scheme. IET Information Security, 7(2), 113–117.CrossRef
28.
Zurück zum Zitat Guo, P., Wang, J., Li, B., & Lee, S. (2014). A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 15(6), 929–936. Guo, P., Wang, J., Li, B., & Lee, S. (2014). A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 15(6), 929–936.
29.
Zurück zum Zitat Shen, J., Tan, H., Wang, J., Wang, J., & Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171–178. Shen, J., Tan, H., Wang, J., Wang, J., & Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171–178.
31.
32.
Zurück zum Zitat Bellare, M., & Rogaway, P. (1993). Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on computer and communications security, pp. 62–73. Bellare, M., & Rogaway, P. (1993). Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on computer and communications security, pp. 62–73.
33.
Zurück zum Zitat Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRefMATH Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRefMATH
34.
Zurück zum Zitat Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In Advances in cryptology EUROCRYPT’96 (pp. 387–398). Berlin, Heidelberg: Springer. Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In Advances in cryptology EUROCRYPT’96 (pp. 387–398). Berlin, Heidelberg: Springer.
Metadaten
Titel
Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network
verfasst von
Yong Xie
Libing Wu
Neeraj Kumar
Jian Shen
Publikationsdatum
14.05.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3352-3

Weitere Artikel der Ausgabe 2/2017

Wireless Personal Communications 2/2017 Zur Ausgabe

Neuer Inhalt