Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network
- 417 Downloads
To enable mobile device seamlessly and securely handover to different access points, a secure and efficient handover authentication scheme is desperately required. However, it is an arduous issue to design a secure handover scheme for wireless network because mobile nodes are limited in power and computational capability, handover latency is severely restricted and wireless network is opening and insecure. To deal the issue, we propose an improved privacy-aware handover authentication scheme for wireless network. We give the security proof to demonstrate our proposed scheme can provide mutual authentication and secure key agreement, and can resist all kinds of known security attacks. Compared with up-to-date similar handover schemes, our proposed scheme not only meets the security requirements of handover scheme, but also decreases computation cost and communication cost. Therefore, our proposed scheme is more suitable for wireless network than the similar schemes.
KeywordsHandover Authentication scheme ID-based authentication Anonymity
This work is supported by National Natural Science Foundation of China (Nos. 61272112, 61472287, 61300237), Science and Technology Support Program of Hubei Province (No. 2013BAA004).
- 1.Islam, S. K., & Khan, M. K. (2014). Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks. International Journal of Communication Systems. doi: 10.1002/dac.2847.
- 4.Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011). A privacy preserving handover authentication scheme for EAP-based wireless networks. In Proceedings of IEEE GLOBECOM, 2011, pp. 1–6.Google Scholar
- 15.Shen, A. N., Guo, S., Zeng, D., & Guizani, M. (2012). A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications. In Proceeding of IEEE wireless communications and networking conference 2012 (WCNC 2012), pp. 2543–2548.Google Scholar
- 17.Han, Q., Zhang, Y., Chen, X., Li, H., & Quan, J. (2012). Efficient and robust identity-based handoff authentication in wireless networks. In L. Xu, E. Bertino & Y. Mu (Eds.), Network and System Security: Proceedings of the 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21–23, 2012 (pp. 180–191). Berlin, Heidelberg: Springer.Google Scholar
- 26.Ren, Y., Shen, J., Wang, J., Han, J., & Lee, S. (2015). Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 16(2), 317–323.Google Scholar
- 28.Guo, P., Wang, J., Li, B., & Lee, S. (2014). A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 15(6), 929–936.Google Scholar
- 29.Shen, J., Tan, H., Wang, J., Wang, J., & Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171–178.Google Scholar
- 32.Bellare, M., & Rogaway, P. (1993). Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on computer and communications security, pp. 62–73.Google Scholar
- 34.Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In Advances in cryptology EUROCRYPT’96 (pp. 387–398). Berlin, Heidelberg: Springer.Google Scholar
- 35.MIRACL library on Certivox.com. https://www.certivox.com/miracl.