Cluster Computing

, Volume 22, Supplement 5, pp 12037–12047 | Cite as

Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks

  • S. KalpanaEmail author
  • S. Chandramathi


In the present 4G era, with the help of vertical handover (VHO), mobility and handover management are handled effectively across heterogeneous network as seamless and ubiquitous connections. The decision making process of VHO selects the best optimal access point. The research proposes a three tier model for handover and proposes two authentication algorithms, based on blind and ring signature, used during execution of VHO. The VHO model is developed in such a way that multiple parameters are used in every stage which includes selection of candidate networks during discovery, mathematical based decision making and authenticated execution. The network system allows the connections to be switched fairly without break or loss of QoS by properly combining the handover execution with a fair authentication procedure. This reduces unfairness and repudiation coming from distrusted network users. Our proposed model ensures continuous quality service through VHO bringing the solution in terms of correctness and efficiency.


Heterogeneous Standard deviation Authentication Blind signature Ring signature 


  1. 1.
    Koeien, G.M., Haslestad, T.: Security aspects of 3G-WLAN interworking. IEEE Commun. Mag. 41, 82–88 (2003)Google Scholar
  2. 2.
    Ouyang, Y.-C., Jang, C.-B., Chen, H.-T.: A secure authentication policy for UMTS and WLAN interworking. In: IEEE ICC, pp. 1552–1557 (2007)Google Scholar
  3. 3.
    Shaikh, F., Mapp, G., Lasebae, A.: A survey of network coverage prediction mechanisms in 4G heterogeneous wireless networks. In: First Global Conference on Communication Science and Information Engineering (CCSIE), pp. 25–27. Middlesex University (2011)Google Scholar
  4. 4.
    Yan, J., Zhao, L., Li, J.: A prediction-based Handover trigger time selection strategy in varying network overlapping environment. In: 2011 IEEE, Vehicular Technology Conference (VTC Fall) (2011)Google Scholar
  5. 5.
    Pahal, S., Singh, B., Arora, A.: A predictive handover initiation mechanism in next generation wireless networks. WSEAS Trans. Commun. 12(6), 271–280 (2013)Google Scholar
  6. 6.
    Zhang, F., Kim, K.: ID based blind signature and ring signature from pairings. In: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT (2002)Google Scholar
  7. 7.
    Kalpana, S., Chandramathi”, S.: A novel mathematical based context aware decision making during vertical handover in heterogeneous wireless networks. Int. J. Print. Packag. Allied Sci.-IJPPAS 5(4), 64–71 (2016)Google Scholar
  8. 8.
    He, D., Ma, M., Zhang, Y., Chen, C., Bu, J.: A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3), 367–374 (2011)CrossRefGoogle Scholar
  9. 9.
    Kaur Gondara, M., Kadam, S.: Requirements of vertical handoff mechanism in 4G wireless networks. Int. J. Wirel. Mob. 3(2), 18–27 (2011)Google Scholar
  10. 10.
    Jayasheela, C., Gowrishankar, S.: A comprehensive parametric analysis of vertical handoff in next generation wireless networks. IOSR J. Comput. Eng. 9(4), 10–17 (2013)CrossRefGoogle Scholar
  11. 11.
    Bhute, H.A, Karde, P.P., Thakare, V.M.: A vertical handover decision approaches in next generation wireless networks: a survey. Int. J. Mob. Netw. Commun. Telemat. (IJMNCT) 4(2) (2014)Google Scholar
  12. 12.
    He, D., Bu, J., Chan, S., Chen, C.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wirel. Commun. 11(1), 48–53 (2012)CrossRefGoogle Scholar
  13. 13.
    He, D., Chen, C., Chan, S., Jiajun, B.: Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Commun. Lett. 16(8), 1270–1273 (2012)CrossRefGoogle Scholar
  14. 14.
    Aboba, B., Simon, D., Eronen, P.: RFC 5247—extensible authentication protocol (EAP) key management framework. IETF (2008)Google Scholar
  15. 15.
    Yang, G., Huang, Q., Wong, D.S., Deng, X.: Universal authentication protocols for anonymous wireless communications. IEEE Trans. Wirel. Communun. 9(1), 168–174 (2010)CrossRefGoogle Scholar
  16. 16.
    Mapp, G., Aiash M., Lasebae, A., Phan, R.: Security models for heterogeneous networking. In: IEEE XPLORE 05, Proceedings of the 2010 International Conference of Security and Cryptography (SECRYPT) (2011)Google Scholar
  17. 17.
    Khan, M.W.: Secure and efficient vertical handover in heterogeneous wireless networks. Int. J. Adv. Netw. Appl. 05(2), 1908–1912 (2013)Google Scholar
  18. 18.
    Sahoo, P.K., Lenka, M.: Development of a certificate less digital signature scheme & implementation in e-cash system. EThesis @NIT RourkelaGoogle Scholar
  19. 19.
    Chaum, D.: Blind signatures for untraceable payments. Advances in Crytptology—Proceedings of Crypto 82, ISBN: 978-1-4757-0604-8Google Scholar
  20. 20.
    Rivest, R.L., Shamir, A., Tauman, Y..: How to leak a secret. In: Advances in Cryptology-Asiacrypt, pp. 552–565. Springer (2001)Google Scholar
  21. 21.
    Kalpana, S., Chandramathi, S.: A novel three-tier model with group based CAC for effective load balancing in heterogeneous wireless networks. Int. J. Adv. Intell. Paradigm. (to be published) (2017)Google Scholar
  22. 22.
    Hassane, A.A.I., Renfa, L., Fanzi, Z.: Handoff necessity estimation for 4G heterogeneous networks. Int. J. Inf. Sci. Tech. (IJIST) 2(1), 1–13 (2012)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Department of Information TechnologySri Krishna College of Engineering and TechnologyCoimbatoreIndia
  2. 2.Department of Electronics and Communication EngineeringSNS College of TechnologyCoimbatoreIndia

Personalised recommendations