Skip to main content
Top
Published in: Cluster Computing 5/2019

28-12-2017

Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks

Published in: Cluster Computing | Special Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the present 4G era, with the help of vertical handover (VHO), mobility and handover management are handled effectively across heterogeneous network as seamless and ubiquitous connections. The decision making process of VHO selects the best optimal access point. The research proposes a three tier model for handover and proposes two authentication algorithms, based on blind and ring signature, used during execution of VHO. The VHO model is developed in such a way that multiple parameters are used in every stage which includes selection of candidate networks during discovery, mathematical based decision making and authenticated execution. The network system allows the connections to be switched fairly without break or loss of QoS by properly combining the handover execution with a fair authentication procedure. This reduces unfairness and repudiation coming from distrusted network users. Our proposed model ensures continuous quality service through VHO bringing the solution in terms of correctness and efficiency.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Koeien, G.M., Haslestad, T.: Security aspects of 3G-WLAN interworking. IEEE Commun. Mag. 41, 82–88 (2003) Koeien, G.M., Haslestad, T.: Security aspects of 3G-WLAN interworking. IEEE Commun. Mag. 41, 82–88 (2003)
2.
go back to reference Ouyang, Y.-C., Jang, C.-B., Chen, H.-T.: A secure authentication policy for UMTS and WLAN interworking. In: IEEE ICC, pp. 1552–1557 (2007) Ouyang, Y.-C., Jang, C.-B., Chen, H.-T.: A secure authentication policy for UMTS and WLAN interworking. In: IEEE ICC, pp. 1552–1557 (2007)
3.
go back to reference Shaikh, F., Mapp, G., Lasebae, A.: A survey of network coverage prediction mechanisms in 4G heterogeneous wireless networks. In: First Global Conference on Communication Science and Information Engineering (CCSIE), pp. 25–27. Middlesex University (2011) Shaikh, F., Mapp, G., Lasebae, A.: A survey of network coverage prediction mechanisms in 4G heterogeneous wireless networks. In: First Global Conference on Communication Science and Information Engineering (CCSIE), pp. 25–27. Middlesex University (2011)
4.
go back to reference Yan, J., Zhao, L., Li, J.: A prediction-based Handover trigger time selection strategy in varying network overlapping environment. In: 2011 IEEE, Vehicular Technology Conference (VTC Fall) (2011) Yan, J., Zhao, L., Li, J.: A prediction-based Handover trigger time selection strategy in varying network overlapping environment. In: 2011 IEEE, Vehicular Technology Conference (VTC Fall) (2011)
5.
go back to reference Pahal, S., Singh, B., Arora, A.: A predictive handover initiation mechanism in next generation wireless networks. WSEAS Trans. Commun. 12(6), 271–280 (2013) Pahal, S., Singh, B., Arora, A.: A predictive handover initiation mechanism in next generation wireless networks. WSEAS Trans. Commun. 12(6), 271–280 (2013)
6.
go back to reference Zhang, F., Kim, K.: ID based blind signature and ring signature from pairings. In: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT (2002) Zhang, F., Kim, K.: ID based blind signature and ring signature from pairings. In: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT (2002)
7.
go back to reference Kalpana, S., Chandramathi”, S.: A novel mathematical based context aware decision making during vertical handover in heterogeneous wireless networks. Int. J. Print. Packag. Allied Sci.-IJPPAS 5(4), 64–71 (2016) Kalpana, S., Chandramathi”, S.: A novel mathematical based context aware decision making during vertical handover in heterogeneous wireless networks. Int. J. Print. Packag. Allied Sci.-IJPPAS 5(4), 64–71 (2016)
8.
go back to reference He, D., Ma, M., Zhang, Y., Chen, C., Bu, J.: A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3), 367–374 (2011)CrossRef He, D., Ma, M., Zhang, Y., Chen, C., Bu, J.: A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3), 367–374 (2011)CrossRef
9.
go back to reference Kaur Gondara, M., Kadam, S.: Requirements of vertical handoff mechanism in 4G wireless networks. Int. J. Wirel. Mob. 3(2), 18–27 (2011) Kaur Gondara, M., Kadam, S.: Requirements of vertical handoff mechanism in 4G wireless networks. Int. J. Wirel. Mob. 3(2), 18–27 (2011)
10.
go back to reference Jayasheela, C., Gowrishankar, S.: A comprehensive parametric analysis of vertical handoff in next generation wireless networks. IOSR J. Comput. Eng. 9(4), 10–17 (2013)CrossRef Jayasheela, C., Gowrishankar, S.: A comprehensive parametric analysis of vertical handoff in next generation wireless networks. IOSR J. Comput. Eng. 9(4), 10–17 (2013)CrossRef
11.
go back to reference Bhute, H.A, Karde, P.P., Thakare, V.M.: A vertical handover decision approaches in next generation wireless networks: a survey. Int. J. Mob. Netw. Commun. Telemat. (IJMNCT) 4(2) (2014) Bhute, H.A, Karde, P.P., Thakare, V.M.: A vertical handover decision approaches in next generation wireless networks: a survey. Int. J. Mob. Netw. Commun. Telemat. (IJMNCT) 4(2) (2014)
12.
go back to reference He, D., Bu, J., Chan, S., Chen, C.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wirel. Commun. 11(1), 48–53 (2012)CrossRef He, D., Bu, J., Chan, S., Chen, C.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wirel. Commun. 11(1), 48–53 (2012)CrossRef
13.
go back to reference He, D., Chen, C., Chan, S., Jiajun, B.: Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Commun. Lett. 16(8), 1270–1273 (2012)CrossRef He, D., Chen, C., Chan, S., Jiajun, B.: Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Commun. Lett. 16(8), 1270–1273 (2012)CrossRef
14.
go back to reference Aboba, B., Simon, D., Eronen, P.: RFC 5247—extensible authentication protocol (EAP) key management framework. IETF (2008) Aboba, B., Simon, D., Eronen, P.: RFC 5247—extensible authentication protocol (EAP) key management framework. IETF (2008)
15.
go back to reference Yang, G., Huang, Q., Wong, D.S., Deng, X.: Universal authentication protocols for anonymous wireless communications. IEEE Trans. Wirel. Communun. 9(1), 168–174 (2010)CrossRef Yang, G., Huang, Q., Wong, D.S., Deng, X.: Universal authentication protocols for anonymous wireless communications. IEEE Trans. Wirel. Communun. 9(1), 168–174 (2010)CrossRef
16.
go back to reference Mapp, G., Aiash M., Lasebae, A., Phan, R.: Security models for heterogeneous networking. In: IEEE XPLORE 05, Proceedings of the 2010 International Conference of Security and Cryptography (SECRYPT) (2011) Mapp, G., Aiash M., Lasebae, A., Phan, R.: Security models for heterogeneous networking. In: IEEE XPLORE 05, Proceedings of the 2010 International Conference of Security and Cryptography (SECRYPT) (2011)
17.
go back to reference Khan, M.W.: Secure and efficient vertical handover in heterogeneous wireless networks. Int. J. Adv. Netw. Appl. 05(2), 1908–1912 (2013) Khan, M.W.: Secure and efficient vertical handover in heterogeneous wireless networks. Int. J. Adv. Netw. Appl. 05(2), 1908–1912 (2013)
18.
go back to reference Sahoo, P.K., Lenka, M.: Development of a certificate less digital signature scheme & implementation in e-cash system. EThesis @NIT Rourkela Sahoo, P.K., Lenka, M.: Development of a certificate less digital signature scheme & implementation in e-cash system. EThesis @NIT Rourkela
19.
go back to reference Chaum, D.: Blind signatures for untraceable payments. Advances in Crytptology—Proceedings of Crypto 82, ISBN: 978-1-4757-0604-8 Chaum, D.: Blind signatures for untraceable payments. Advances in Crytptology—Proceedings of Crypto 82, ISBN: 978-1-4757-0604-8
20.
go back to reference Rivest, R.L., Shamir, A., Tauman, Y..: How to leak a secret. In: Advances in Cryptology-Asiacrypt, pp. 552–565. Springer (2001) Rivest, R.L., Shamir, A., Tauman, Y..: How to leak a secret. In: Advances in Cryptology-Asiacrypt, pp. 552–565. Springer (2001)
21.
go back to reference Kalpana, S., Chandramathi, S.: A novel three-tier model with group based CAC for effective load balancing in heterogeneous wireless networks. Int. J. Adv. Intell. Paradigm. (to be published) (2017) Kalpana, S., Chandramathi, S.: A novel three-tier model with group based CAC for effective load balancing in heterogeneous wireless networks. Int. J. Adv. Intell. Paradigm. (to be published) (2017)
22.
go back to reference Hassane, A.A.I., Renfa, L., Fanzi, Z.: Handoff necessity estimation for 4G heterogeneous networks. Int. J. Inf. Sci. Tech. (IJIST) 2(1), 1–13 (2012) Hassane, A.A.I., Renfa, L., Fanzi, Z.: Handoff necessity estimation for 4G heterogeneous networks. Int. J. Inf. Sci. Tech. (IJIST) 2(1), 1–13 (2012)
Metadata
Title
Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks
Publication date
28-12-2017
Published in
Cluster Computing / Issue Special Issue 5/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1549-1

Other articles of this Special Issue 5/2019

Cluster Computing 5/2019 Go to the issue

Premium Partner