Skip to main content
Top
Published in: Wireless Personal Communications 2/2015

01-01-2015

A New Privacy-Aware Handover Authentication Scheme for Wireless Networks

Authors: Guangsong Li, Qi Jiang, Fushan Wei, Chuangui Ma

Published in: Wireless Personal Communications | Issue 2/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A fast handover authentication scheme is essential to seamless services for delay-sensitive applications in wireless networks. User privacy is a notable issue which should be considered in secure communications. This paper proposes a new privacy-aware handover authentication scheme. The proposed scheme achieves user privacy with good performance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communication, 11(1), 48–53.CrossRef He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communication, 11(1), 48–53.CrossRef
2.
go back to reference Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011). A privacy preserving handover authentication schemes for EAP-based wireless networks. Proceedings of IEEE GLOBECOM, 2011, 1–6. Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011). A privacy preserving handover authentication schemes for EAP-based wireless networks. Proceedings of IEEE GLOBECOM, 2011, 1–6.
3.
go back to reference He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.CrossRef He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.CrossRef
4.
go back to reference Yeo, S. L., Yap, W., Liu, J. K., & Henricksen, M. (2013). Comments on “Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”. IEEE Communications Letters, 17(8), 1521–1523.CrossRef Yeo, S. L., Yap, W., Liu, J. K., & Henricksen, M. (2013). Comments on “Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”. IEEE Communications Letters, 17(8), 1521–1523.CrossRef
5.
go back to reference Tsai, J., Lo, N., & Wu, T. (2013). Secure handover authentication protocol based on bilinear pairings. Wireless Personal Communications, 73(3), 1037–1047.CrossRef Tsai, J., Lo, N., & Wu, T. (2013). Secure handover authentication protocol based on bilinear pairings. Wireless Personal Communications, 73(3), 1037–1047.CrossRef
6.
go back to reference Cao, J., Ma, M., & Li, H. (2012). An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Transactions on Wireless Communication, 11(10), 3644–3650.CrossRef Cao, J., Ma, M., & Li, H. (2012). An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Transactions on Wireless Communication, 11(10), 3644–3650.CrossRef
7.
go back to reference He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communication, 10(2), 431–436.CrossRef He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communication, 10(2), 431–436.CrossRef
8.
go back to reference He, D., Bu, J., Chan, S., & Chen, C. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks. IEEE Transactions on Computers, 62(3), 616–622.CrossRefMathSciNet He, D., Bu, J., Chan, S., & Chen, C. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks. IEEE Transactions on Computers, 62(3), 616–622.CrossRefMathSciNet
9.
go back to reference Galindo, D., & Garcia, F. D. (2009). A Schnorr-like lightweight identity-based signature scheme. Proceedings of AFRICACRYPT, 09, 135–148. Galindo, D., & Garcia, F. D. (2009). A Schnorr-like lightweight identity-based signature scheme. Proceedings of AFRICACRYPT, 09, 135–148.
10.
go back to reference LaMacchia, B., Lauter, K., & Mityagin, A. (2007). Stronger security of authenticated key exchange. Proceedings of ProvSec, 4784, 1–16. LaMacchia, B., Lauter, K., & Mityagin, A. (2007). Stronger security of authenticated key exchange. Proceedings of ProvSec, 4784, 1–16.
11.
go back to reference Ustaoglu, B. (2008). Obtaining a secure and efficient key agreement protocol for (H)MQV and NAXOS. Designs, Codes and Cryptography, 46(3), 329–342.CrossRefMathSciNet Ustaoglu, B. (2008). Obtaining a secure and efficient key agreement protocol for (H)MQV and NAXOS. Designs, Codes and Cryptography, 46(3), 329–342.CrossRefMathSciNet
Metadata
Title
A New Privacy-Aware Handover Authentication Scheme for Wireless Networks
Authors
Guangsong Li
Qi Jiang
Fushan Wei
Chuangui Ma
Publication date
01-01-2015
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2015
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-2029-z

Other articles of this Issue 2/2015

Wireless Personal Communications 2/2015 Go to the issue