Abstract
In this paper, we propose a new identity-based construction for secure and efficient handoff authentication schemes, in which a special double-trapdoor chameleon hash function serves as the primary ingredient. Compared with all the existing identity-based handoff-related schemes, the main advantage of the proposed scheme eliminates the assumption that PKG is fully trusted. Besides, we show that the proposed scheme not only provides robust security properties, but also enjoys desirable efficiency for the real-world applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chaplin, C., Qi, E., Ptasinski, H., Walker, J., Li, S.: 802.11i overview, IEEE.802.11-04/0123r1 ( February 2005), http://www.drizzle.com/~aboba/IEEE
Mishra, A., Shin, M., Arbaugh, W.: Proactive Key Distribution Using Neighbor Graphs. IEEE Wireless Communication Magazine 11(1), 26–36 (2004)
Pack, S., Choi, Y.: Fast Handoff Scheme based on mobility prediction in public wireless LAN systems. IEE Proc.-Commun. 151(5), 489–495 (2004)
Hong, K., Jung, S., Wu, S.F.: A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 96–107. Springer, Heidelberg (2006)
Wang, H., Prasad, A.R.: Fast Authentication for Inter-domain Handover. In: de Souza, J.N., Dini, P., Lorenz, P. (eds.) ICT 2004. LNCS, vol. 3124, pp. 973–982. Springer, Heidelberg (2004)
Choi, J., Jung, S.: A Secure and Efficient Handover Authentication Based on Light-weight Diffie-Hellman on Mobile Node in FMIPv6. IEICE Transactions on Communications E-91B(2), 605–608 (2008)
Zhang, C., Lu, R., Ho, P., Chen, A.: A location Privacy Preserving Authentication Scheme in Vehicular Networks. In: WCNC 2008, pp. 2543–2548. IEEE Communications Society, New York (2008)
Choi, J., Jung, S.: A Handover Authentication Using Credentials Based on Chameleon Hashing. IEEE Communication Letters 14(1), 54–56 (2010)
Krawczyk, H., Rabin, T.: Chameleon Signatures. In: NDSS 2000, pp. 143–154 (2000)
Yoon, E., Khan, M., Yoo, K.: Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing. IEICE Transactions on Information and Systems E93-D(12), 3400–3402 (2010)
Kim, Y., Ren, W., Jo, J., Yang, M., Jiang, J., Zheng: SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-based Cryptography. In: ICC 2007, pp. 1570–1575. IEEE Communications Society, New York (2007)
Zhang, Y., Chen, X., Li, H., Cao, J.: Secure And Efficient Identity-Based Handoff Authentication Schemes. Security and Communication Networks, February 6 (2012), doi:10.1002/sec.421
Chen, X., Zhang, F., Susilo, W., Mu, Y.: Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 18–30. Springer, Heidelberg (2007)
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Chaum, D., van Antwerpen, H.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, Heidelberg (1990)
Ateniese, G., de Medeiros, B.: Identity-Based Chameleon Hash and Applications. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 164–180. Springer, Heidelberg (2004)
Chen, X., Zhang, F., Kim, K.: Chameleon Hashing Without Key Exposure. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 87–98. Springer, Heidelberg (2004)
Ateniese, G., de Medeiros, B.: On the Key Exposure Problem in Chameleon Hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 165–179. Springer, Heidelberg (2005)
Shamir, A., Tauman, Y.: Improved Online/Offline Signature Schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355–367. Springer, Heidelberg (2001)
Even, S., Goldreich, O., Micali, S.: On-Line/Off-Line Digital Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263–275. Springer, Heidelberg (1990)
Even, S., Goldreich, O., Micali, S.: On-line/Off-line Digital Signatures. Journal of Cryptology 9(1), 35–67 (1996)
Chen, X., Zhang, F., Tian, H., Wei, B., Susilo, W., Mu, Y., Lee, H., Kim, K.: Efficient Generic On-line/Off-line (Threshold) Signatures Without Key Exposure. Information Sciences 178(21), 4192–4203 (2008)
Harn, L., Hsin, W., Lin, C.: Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families. The Computer Journal 53(9), 1478–1484 (2010)
Hess, F.: Efficient Identity Based Signature Schemes Based on Pairings. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)
Johnson, D., Menezes, A., Vanstone, S.: The Elliptic Curve Digital Signature Algorithm (ECDSA). International Journal of Information Security 1(1), 36–63 (2001)
Lenstra, A.K., Verheul, E.R.: Selecting Cryptographic Key Sizes. Journal of Cryptology 14(4), 255–293 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Han, Q., Zhang, Y., Chen, X., Li, H., Quan, J. (2012). Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-34601-9_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34600-2
Online ISBN: 978-3-642-34601-9
eBook Packages: Computer ScienceComputer Science (R0)