Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing
Introduction
With the rapid growing of different wireless technologies, such as LTE, CDMA, WiMAX, and WiFi, cloud computing is no longer limited to wire-connected computing devices. Smart phone or tablet becomes the most frequently used computing device. With the distributed computing structure of cloud, using mobile devices to access the cloud will be the next generation computing paradigm. This is also known as Mobile Cloud Computing (MCC). Within the paradigm of MCC, user devices will require roam across heterogeneous access technologies in order to enjoy a seamless connectivity. However, since security policies vary greatly among different networks, security contexts need to be resolved anew upon a vertical handover, which results in efficiency slow-down and induces security risks. Supporting seamless roaming and secure handover in MCC is a challenging task since each access network may have different mobility, Quality-of-Service (QoS) and security requirements. Moreover, real-time cloud applications such as video conferencing and media streaming [1] have stringent performance requirements on end-to-end delay and packet loss. In order to overcome these performance bounds and provide continuous secure services for mobile clients, it is necessary to design an efficient handover protocol.
Authentication is an important module in the handover protocol. As shown in Fig. 1 (assumed that there is an integrated WiMAX and WiFi networks), regardless of the technology implemented in MCC, a typical heterogeneous handover authentication scenario could come down to involving four entities: mobile clients (MCs), access points (APs) or base stations (BSs), gateway routers (GWs) and the authentication server (AS) which is located at the cloud service provider. Before entering the network, a MC must register to AS. After granted the permission from AS, MC connects to an AP (or a BS) for accessing the network through GW. A MC moves from one AP (or BS) to a new AP (or BS) within the domain of a single wireless access network, which refers to horizontal handover. Conversely, a MC handovers among heterogeneous wireless access networks, which refers to vertical handover. After MC roams to a new AP (or BS), handover authentication should be performed at the new AP (or BS). The AP (or BS) will authenticate the legitimate MC and reject any access request by illegitimate users. At the same time, they will establish a session key between this authenticated MC and AP (or BS) for the purpose of providing confidentiality and integrity of the communication session.
In this paper, we further illustrate the above procedure by considering an integrated WiMAX and WiFi heterogeneous networks, where a WiMAX network is interconnecting with WiFi network through a WiFi interworking Function (WIF) [2] which is predefined by the WiMAX forum for roaming support. The WIF plays an important role in interfacing WiMAX and WiFi networks, which enables the MC with WiFi network connectivity to access WiMAX network functionality [3]. In Fig. 1, entities enforcing access control are authenticators that refer to an Access Service Network-Gateway (ASN-GW) or AP. An ASN-GW controls multiple BSs and takes charge of forwarding authentication messages between the MC and the AS residing in the Cloud Service Provider (CSP). Considering the security, we assume that secure transmission protocols have been used in all the entities containing AS, ASN-GW, BS, WIF and AP to maintain mutual trusted relations and establish connections.
There are two major practical issues on designing a handover authentication protocol in MCC:
- •
First, security and privacy are two major concerns for the handover authentication process. For privacy, mobile clients may prefer to keep their identities and location hidden. It is a notable issue in wireless networks since roaming protocols may expose users’ identities and locations at the user authentication phase. Identity privacy is relevant to the MC when it sends authentication request (which includes its identity). A robust and privacy-preserving scheme is therefore essential to resist any adversary from getting the identity of the authenticated user. On the other side, location privacy is relevant to the AP or BS when MC has accessed with it, since any attacker can trace MC’s movement route. Therefore, user anonymity and untraceability should be paid more attention to in the handover protocol.
- •
Second, efficiency also needs to be intensively considered for handover authentication service. This is of great importance for guaranteeing service continuity and QoS, which means low latency and low packet loss when a MC is handovering to another network [4]. Since either MCs or APs are generally constrained by power and processing capability, an efficient handover authentication protocol should be essential. Furthermore, such a protocol must be able to maintain persistent connectivity between MCs and APs.
There are several authentication protocols proposed in some literature for the purpose of achieving a secure and efficient handover authentication in a heterogeneous network [3], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19]. However, most of these existing authentication protocols ultimately turn out to have a few drawbacks, which we divide into following aspects:
- •
Interact with AS during mutual authentication or need the participation of third parties, such as home AP/BS;
- •
Cannot provide a privacy protection mechanisms even they may have serious security flaws;
- •
Incur high authentication costs and low efficiency, which cannot achieve the requirement of seamless handover; and
- •
Complex design of schemes results in suffering weakness on universality.
Five fast and secure re-authentication protocols for 3GPP subscribers to perform handovers between the WiMAX and the WLAN systems have been proposed in [11], which takes advantage of key reuse and avoids contacting AS in the 3GPP networks during the handovers. Here ‘key reuse’ means that a key stored in a previously visited network is reused for re-authentication while the user re-visits the network, thus it speeds up the key re-generation process and reduces the authentication cost. Although this scheme can achieve an outstanding performance in terms of the key reuse trait and the re-authentication delay compared with the current 3GPP standard protocols [2] and can provide several security features including forward and backward secrecy, it can only support single-hop communications between a MC and AP/BS and the re-authentication processing time unable to satisfy the requirement of real-time applications. The scheme by [3] presents a fast authentication for WiMAX–WLAN integrated network with the assumption that the AS has robust security features. The authors use the AS to ensure the handover security. By adopting the localized authentication concept and utilizing the approach of pre-authentication, it can avoid suffering a longer delay. However, since the AS is normally located far away from the BS/AP, it may incur accident to degrade the system performance such as a connection loss between the BS/AP and the AS.
Recently, a fast and secure handover authentication scheme based on ticket for WiMAX and WiFi heterogeneous networks has been proposed in [14]. The MC and the target BS/AP can complete the mutual authentication and derive their session key by a credential ticket generated by the previously visited BS/AP without interacting with AS. By executing such local authentication which significantly reduces the handover authentication delay. Nevertheless, it does not provide a privacy protection and has weakness on universality.
Regarding privacy, unfortunately all the above schemes have provided no privacy protection measures and no universality for various networks. In [15], a universal authentication protocol with strong user anonymity for wireless communication networks was proposed by Yang et al. It is based on group signature and only requires three message flaws between the roaming MC and the foreign BS/AP during handover. Though this protocol can assure user anonymity and provide a practical user revocation mechanism, it still fails to provide user untraceability [21] and the protocol may become time-wasting and power-consuming when the number of revoked users is large. Cao et al. [16] proposed an unified ID-based cryptography handover authentication scheme without pairing operation for heterogeneous access networks. The handover authentication is executed between a MC and the target AP without the third party. Although the authors claim that their scheme achieves user anonymity, the identity of the MC may still be exposed to attackers, since the real identity is passed in plaintext when the MC requests handover authentication to the target AP. Therefore, the scheme cannot achieve real user anonymity and untraceability. Very recently, Liu et al. [19] proposed a time-bound anonymous authentication protocol for roaming network. Similar to [15], it is based on group signature with time information embedded into the signature. By doing so, revoked users can be classified into natural revoked (expired user) and obliged revoked. Yet user untraceability is not yet feasible.
Taking into account the above analysis, users are unwilling to accept such service which always fails to provide appropriate security and efficiency guarantees. Thus, providing a practical handover authentication with efficiency and user privacy scheme becomes a notable issue in the MCC context. In this paper, taking the advantage of an identity-based elliptic curve algorithm in [22], we propose a new universal efficient handover authentication with user anonymity and untraceability for MCC. Our proposed scheme can be distinguished from previous works and the merits can be summarized in several aspects:
- 1.
No extra third party. Except both the MC and the BS/AP, there is no additional participation of any third party during the handover authentication, such as AS or home AP/BS.
- 2.
Simple in design. We need only one handover authentication protocol to handle various heterogeneous network scenarios.
- 3.
Universality. The protocol is universal in the sense that the same protocol can be used appropriately for different heterogeneous network.
- 4.
User anonymity and untraceability. In order to satisfy the requirement of modern society, our protocol supports user anonymity and untraceability.
- 5.
Robust security and efficiency. On the basis of a robust security, our protocol enjoys high efficiency in authentication performance compared with existing schemes.
The remaining part of this paper is organized as follows. Section 2 discusses the security requirements and introduces the elliptic curve group. Section 3 presents our scheme and Section 4 analyzes the security and performance of our scheme. We conclude the paper in Section 5.
Section snippets
Security requirements
A secure and user anonymous handover authentication scheme in MCC should satisfy the following requirements:
- 1.
Mutual authentication: Both of the roaming MC and the target AP are all authorized by the AS.
- 2.
Access grant: MCs should be allowed by AS to authenticate the AP which they visit in order to avoid potential deception and other malicious attacks.
- 3.
Key establishment: The MC, the target AP and the AS all share a common secret.
- 4.
Data integrity: Data transmitted in the network cannot be tampered,
Proposed scheme
In this section, we shall describe the details of our proposed vertical handover authentication scheme. It consists of two phases, namely key pre-distribution phase and handover authentication phase as shown in Fig. 2. Before the description, we will begin with the pre-deployment. The notations used in the scheme are also defined in Table 1.
Security analysis
We analyze the security of our proposed scheme with respect to the security requirements given in Section 2.
Mutual authentication and key establishment: Due to the existence of trust agreements between AS, ASN-GW, BS, WIF and AP in the WiMAX and WiFi heterogeneous networks, we only discuss the mutual authentication between MC and AP in the proposed scheme. Mutual authentication between the MC and is accomplished based on identities and CDH problem. The MC and check the hash values from
Conclusions
In this paper, we have proposed a novel protocol to achieve efficient handover authentication for Mobile Cloud Computing paradigm. This novel protocol provides such advantages which can be summarized as universality, robust security and efficiency. The security and performance analysis shows that the proposed scheme achieves user anonymity and untraceability with excellent performance. With these advantages, we believe the new proposal provides a sound solution to handoff in MCC.
Acknowledgments
This work is supported by National Natural Science Foundation of China (61472083, 61402110, U1405255), Fok Ying Tong Education Foundation (141065), Program for New Century Excellent Talents in Fujian University (JA14067), Distinguished Young Scholars Fund of Department of Education, Fujian Province, China (JA13062), ISN Research Fund (ISN15-03), Fujian Normal University Innovative Research Team (IRTL1207), and the Scientific Research Foundation for the Returned Overseas Chinese Scholars.
Xu Yang received his B.S. degree from the Department of electrical and information engineering, Hubei University of Automotive Technology, China, in 2013. He is currently a Graduate at the Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, China. His research interests include cryptography and information security.
References (22)
- et al.
Secure sharing and searching for real-time video data in mobile cloud
IEEE Network
(2015) - et al.
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
Inform. Sci.
(2010) - W.F.N.W. Group, et al. Wimax forum network architecture—stage 3: Detailed protocols and procedures—release 1, version...
- et al.
A fast authentication scheme for wimax–wlan vertical handover
Wirel. Pers. Commun.
(2013) - et al.
Seamless handover in terrestrial radio access networks: a case study
IEEE Commun. Mag.
(2003) - H. Kwon, K.-y. Cheon, K. Roh, A. Park, Usim based authentication test-bed for UMTS-WLAN handover, in: Proceedings of...
- H. Liming, K.X. Miao, A pre-authentication architecture in WiFi&WiMAX integrated system, in: Communications and...
- H.-M. Sun, S.-M. Chen, Y.-H. Chen, H.-J. Chung, I.-H. Lin, Secure and efficient handover schemes for heterogeneous...
- et al.
Wireless telemedicine services over integrated IEEE 802.11/Wlan and IEEE 802.16/WiMAX networks
IEEE Wirel. Commun.
(2010) - et al.
One-pass eap-aka authentication in 3G-WLAN integrated networks
Wirel. Pers. Commun.
(2009)
Authentication mechanism for fast handoff in CDMA2000-wibro interworking
Sci. China Ser. F: Inform. Sci.
Cited by (82)
A secure access control scheme with batch verification for VANETs
2023, Computer CommunicationsFastHand: A fast handover authentication protocol for densely deployed small-cell networks
2022, Journal of Network and Computer ApplicationsSeamless privacy-preservation and authentication framework for IoT-enabled smart eHealth systems
2022, Sustainable Cities and SocietyCitation Excerpt :However, a prospective solution has been presented in Q. Jiang et al. (2018). Yang, Huang and Liu (2016) designed an efficient handover authentication that claims user anonymity and un-traceability for cloud computing. Their protocol assigns dynamic pseudo-identities to claim secret session-key.
A seamless anonymous authentication protocol for mobile edge computing infrastructure
2022, Computer CommunicationsProviding impersonation resistance for biometric-based authentication scheme in mobile cloud computing service
2022, Computer CommunicationsFogHA: An efficient handover authentication for mobile devices in fog computing
2021, Computers and SecurityCitation Excerpt :This scheme improves the handover performance. but the subsequent studies found that Cao et al.’s scheme cannot achieve user anonymity, unlinkability and traceability (Yang et al., 2016). Based on Cao et al.’s scheme, Yang et al. (2016) designed a handover authentication scheme with user anonymity for heterogeneous mobile cloud networks.
Xu Yang received his B.S. degree from the Department of electrical and information engineering, Hubei University of Automotive Technology, China, in 2013. He is currently a Graduate at the Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, China. His research interests include cryptography and information security.
Xinyi Huang received his Ph.D. degree from the School of Computer Science and Software Engineering, University of Wollongong, Australia, in 2009. He is currently a Professor at the Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, China. His research interests include cryptography and information security. He has published over 90 research papers in refereed international conferences and journals, such as PKC, IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Information Security and Forensics, and IEEE Journal on Selected Areas in Communications. His work has been cited more than 1600 times at Google Scholar (H-Index: 23). He is on the Editorial Board of IEEE Transactions on Dependable and Secure Computing and International Journal of Information Security. He has served as the program/general chair or program committee member in over 60 international conferences.
Joseph K. Liu received the Ph.D. degree in information engineering from the Chinese University of Hong Kong in July 2004, specializing in cyber security, protocols for securing wireless networks, privacy, authentication, and provable security. He is now a senior lecturer at Monash University, Australia, and an adjunct associate professor at Shenzhen University, China. Prior to that he was a research scientist in the Infocomm Security Department at the Institute for Infocomm Research, Singapore, from 2007 to 2015. His currenttechnical focus is particularly on cyber security in the cloud computing paradigm, smart city, lightweight security, and privacy enhanced technology. He has published more than 80 refereed journal and conference papers and received the Best Paper Award from ESORICS 2014. He has served as the program chair of ProvSec 2007, 2014, Pairing 2015, and on the program committees of more than 35 international conferences.