Skip to main content
Erschienen in: Wireless Networks 7/2017

29.04.2016

Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks

verfasst von: Anmin Fu, Ningyuan Qin, Yongli Wang, Qianmu Li, Gongxuan Zhang

Erschienen in: Wireless Networks | Ausgabe 7/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Seamless handover between the evolved universal terrestrial radio access network and other access networks is highly desirable to mobile equipments in the long term evolution (LTE) or LTE-Advanced (LTE-A) networks, but ensuring security and efficiency of this process is challenging. In this paper, we propose a novel privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing to fit in with all of the mobility scenarios in the LTE/LTE-A networks, which is called Nframe. To the best of our knowledge, Nframe is the first to support protecting users’ privacy with non-frameability in the handover process. Moreover, Nframe uses pairing-free identity based cryptographic method to secure handover process and to achieve high efficiency. The formal verification by the AVISPA tool shows that Nframe is secure against various malicious attacks and the simulation result indicates that it outperforms the existing schemes in terms of computation and communication cost.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ghosh, A., Ratasuk, R., Mondal, B., Mangalvedhe, N., & Thomas, T. (2010). LTE-Advanced: Next-generation wireless broadband technology. IEEE Wireless Communications, 17(3), 10–22.CrossRef Ghosh, A., Ratasuk, R., Mondal, B., Mangalvedhe, N., & Thomas, T. (2010). LTE-Advanced: Next-generation wireless broadband technology. IEEE Wireless Communications, 17(3), 10–22.CrossRef
2.
Zurück zum Zitat 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Service requirements for the Evolved Packet System (EPS) (Rel13), 3GPP TS 22.278 V13.2.0, 2014. 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Service requirements for the Evolved Packet System (EPS) (Rel13), 3GPP TS 22.278 V13.2.0, 2014.
3.
Zurück zum Zitat 3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; 3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses (Rel 12), 3GPP TS 33.402V12.5.0, 2014. 3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; 3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses (Rel 12), 3GPP TS 33.402V12.5.0, 2014.
4.
Zurück zum Zitat Fu, A., Zhang, Y., Zhu, Z., et al. (2012). An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network. Computers and Security, 31(6), 741–749.CrossRef Fu, A., Zhang, Y., Zhu, Z., et al. (2012). An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network. Computers and Security, 31(6), 741–749.CrossRef
5.
Zurück zum Zitat Cao, J., Ma, M., Li, H., et al. (2014). A survey on security aspects for LTE and LTE-A networks. IEEE Communications Surveys and Tutorials, 16(1), 283–302.CrossRef Cao, J., Ma, M., Li, H., et al. (2014). A survey on security aspects for LTE and LTE-A networks. IEEE Communications Surveys and Tutorials, 16(1), 283–302.CrossRef
6.
Zurück zum Zitat Han, C., & Choi, H. (2014). Security analysis of handover key management in 4G LTE/SAE networks. IEEE Transactions on Mobile Computing, 13(2), 457–468. Han, C., & Choi, H. (2014). Security analysis of handover key management in 4G LTE/SAE networks. IEEE Transactions on Mobile Computing, 13(2), 457–468.
7.
Zurück zum Zitat He, D., Chan, S., Guizani, M., et al. (2015). Handover authentication for mobile networks: Security and efficiency aspects. IEEE Network, 29(3), 96–103.CrossRef He, D., Chan, S., Guizani, M., et al. (2015). Handover authentication for mobile networks: Security and efficiency aspects. IEEE Network, 29(3), 96–103.CrossRef
8.
Zurück zum Zitat Duan, X., & Wang, X. (2015). Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Communications Magazine, 53(4), 28–35.CrossRef Duan, X., & Wang, X. (2015). Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Communications Magazine, 53(4), 28–35.CrossRef
9.
Zurück zum Zitat Ghadafi, E. (2014). Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions. In IACR cryptology ePrint Archive, Report 2014/278. Ghadafi, E. (2014). Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions. In IACR cryptology ePrint Archive, Report 2014/278.
10.
Zurück zum Zitat Nakhjiri, M. (2007). Use of EAP-AKA, IETF HOKEY and AAA mechanisms to provide access and handover security and 3G-802.16M interworking. In Proceedings of PIMRC’07 (pp. 1–5). Nakhjiri, M. (2007). Use of EAP-AKA, IETF HOKEY and AAA mechanisms to provide access and handover security and 3G-802.16M interworking. In Proceedings of PIMRC’07 (pp. 1–5).
11.
Zurück zum Zitat Narayanan, V., & Dondeti, L. (2008). EAP extensions for EAP re-authentication protocol (ERP). IETF RFC 5296. Narayanan, V., & Dondeti, L. (2008). EAP extensions for EAP re-authentication protocol (ERP). IETF RFC 5296.
12.
Zurück zum Zitat Fu, A., Zhang, G., Zhu, Z., et al. (2014). Fast and secure handover authentication scheme based on ticket for WiMAX and WiFi heterogeneous networks. Wireless Personal Communications, 79(2), 1277–1299.CrossRef Fu, A., Zhang, G., Zhu, Z., et al. (2014). Fast and secure handover authentication scheme based on ticket for WiMAX and WiFi heterogeneous networks. Wireless Personal Communications, 79(2), 1277–1299.CrossRef
13.
Zurück zum Zitat Yang, T., Lai, C., Lu, R., et al. (2015). EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks. Peer-to-Peer Networking and Applications, 8(2), 216–228.CrossRef Yang, T., Lai, C., Lu, R., et al. (2015). EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks. Peer-to-Peer Networking and Applications, 8(2), 216–228.CrossRef
14.
Zurück zum Zitat Fu, A., Zhang, G., Yu, Y., et al. (2014). A privacy preserving vertical handover authentication scheme for WiMAX–WiFi networks. KSII Transactions on Internet and Information Systems, 8(9), 3250–3265. Fu, A., Zhang, G., Yu, Y., et al. (2014). A privacy preserving vertical handover authentication scheme for WiMAX–WiFi networks. KSII Transactions on Internet and Information Systems, 8(9), 3250–3265.
15.
Zurück zum Zitat Politis, C., Chew, K. A., Akhtar, N., et al. (2004). Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks. IEEE Wireless Communications, 11(4), 76–88.CrossRef Politis, C., Chew, K. A., Akhtar, N., et al. (2004). Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks. IEEE Wireless Communications, 11(4), 76–88.CrossRef
16.
Zurück zum Zitat Xu, L., He, Y., Chen, X., et al. (2014). Ticket-based handoff authentication for wireless mesh networks. Computer Networks, 73, 185–194.CrossRef Xu, L., He, Y., Chen, X., et al. (2014). Ticket-based handoff authentication for wireless mesh networks. Computer Networks, 73, 185–194.CrossRef
17.
Zurück zum Zitat Fu, A., Lan, S., Huang, B., et al. (2012). A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX Networks. IEEE Communications Letters, 16(11), 1744–1747.CrossRef Fu, A., Lan, S., Huang, B., et al. (2012). A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX Networks. IEEE Communications Letters, 16(11), 1744–1747.CrossRef
18.
Zurück zum Zitat Fu, A., Zhang, G., Zhang, Y., et al. (2013). GHAP: An efficient group-based handover authentication mechanism for IEEE 802.16m networks. Wireless Personal Communications, 70(4), 1793–1810.CrossRef Fu, A., Zhang, G., Zhang, Y., et al. (2013). GHAP: An efficient group-based handover authentication mechanism for IEEE 802.16m networks. Wireless Personal Communications, 70(4), 1793–1810.CrossRef
19.
Zurück zum Zitat Jing, Q., Zhang, Y., Liu, X., et al. (2012). An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks. In Proceedings of ICC’12 (pp. 857–862). Jing, Q., Zhang, Y., Liu, X., et al. (2012). An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks. In Proceedings of ICC’12 (pp. 857–862).
20.
Zurück zum Zitat He, D., Chen, C., Chan, S., et al. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRef He, D., Chen, C., Chan, S., et al. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRef
21.
Zurück zum Zitat Housley, R., & Aboba, B. (2007). Guidance for authentication, authorization, and accounting (AAA) key management. IETF RFC 4962. Housley, R., & Aboba, B. (2007). Guidance for authentication, authorization, and accounting (AAA) key management. IETF RFC 4962.
22.
Zurück zum Zitat Cao, J., Ma, M., & Li, H. (2012). An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Transactions on Wireless Communications, 11(10), 3644–3650.CrossRef Cao, J., Ma, M., & Li, H. (2012). An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Transactions on Wireless Communications, 11(10), 3644–3650.CrossRef
23.
Zurück zum Zitat Yeo, S. L., Yap, W., Liu, J. K., et al. (2013). Comments on “Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”. IEEE Communications Letters, 17(8), 1521–1523.CrossRef Yeo, S. L., Yap, W., Liu, J. K., et al. (2013). Comments on “Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”. IEEE Communications Letters, 17(8), 1521–1523.CrossRef
24.
Zurück zum Zitat Engoulou, R., Bellaïche, M., Pierre, S., et al. (2014). VANET security surveys. Computer Communications, 44, 1–13.CrossRef Engoulou, R., Bellaïche, M., Pierre, S., et al. (2014). VANET security surveys. Computer Communications, 44, 1–13.CrossRef
25.
Zurück zum Zitat Jiang, W., Lin, D., Li, F., et al. (2014). Randomized and efficient authentication in mobile environments. In IACR cryptology ePrint Archive, Report 2014/86. Jiang, W., Lin, D., Li, F., et al. (2014). Randomized and efficient authentication in mobile environments. In IACR cryptology ePrint Archive, Report 2014/86.
26.
Zurück zum Zitat Jung, C. D., Sur, C., Park, Y., et al. (2009). A robust conditional privacy-preserving authentication protocol in VANET. In Proceedings of MobiSec’09 (pp. 35–45). Jung, C. D., Sur, C., Park, Y., et al. (2009). A robust conditional privacy-preserving authentication protocol in VANET. In Proceedings of MobiSec’09 (pp. 35–45).
28.
Zurück zum Zitat Miller, V. (1985). Uses of elliptic curves in cryptography. In Proceedings of CRYPTO’85 (pp. 417–426). Miller, V. (1985). Uses of elliptic curves in cryptography. In Proceedings of CRYPTO’85 (pp. 417–426).
29.
Zurück zum Zitat Chen, C., He, D., Chan, S., et al. (2011). Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems, 24(3), 347–362.CrossRef Chen, C., He, D., Chan, S., et al. (2011). Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems, 24(3), 347–362.CrossRef
30.
Zurück zum Zitat Cao, J., Li, H., Ma, M., et al. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks. Computer Networks, 56(8), 2119–2131.CrossRef Cao, J., Li, H., Ma, M., et al. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks. Computer Networks, 56(8), 2119–2131.CrossRef
31.
Zurück zum Zitat Choi, J., & Jung, S. (2010). A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters, 14(1), 54–56.CrossRef Choi, J., & Jung, S. (2010). A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters, 14(1), 54–56.CrossRef
32.
Zurück zum Zitat Piro, G., Grieco, L. A., Boggia, G., et al. (2011). Simulating LTE cellular systems: An open-source framework. IEEE Transactions on Vehicular Technology, 60(2), 498–513.CrossRef Piro, G., Grieco, L. A., Boggia, G., et al. (2011). Simulating LTE cellular systems: An open-source framework. IEEE Transactions on Vehicular Technology, 60(2), 498–513.CrossRef
33.
Zurück zum Zitat Baldo, N., Requena, M., Miozzo, M., et al. (2013). An open source model for the simulation of LTE handover scenarios and algorithms in ns-3. In Proceedings of MSWiM’13 (pp. 289–298). Baldo, N., Requena, M., Miozzo, M., et al. (2013). An open source model for the simulation of LTE handover scenarios and algorithms in ns-3. In Proceedings of MSWiM’13 (pp. 289–298).
Metadaten
Titel
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks
verfasst von
Anmin Fu
Ningyuan Qin
Yongli Wang
Qianmu Li
Gongxuan Zhang
Publikationsdatum
29.04.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 7/2017
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1277-0

Weitere Artikel der Ausgabe 7/2017

Wireless Networks 7/2017 Zur Ausgabe

Neuer Inhalt