Advertisement

Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks

  • Qi Han
  • Yinghui Zhang
  • Xiaofeng Chen
  • Hui Li
  • Jiaxiang Quan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7645)

Abstract

In this paper, we propose a new identity-based construction for secure and efficient handoff authentication schemes, in which a special double-trapdoor chameleon hash function serves as the primary ingredient. Compared with all the existing identity-based handoff-related schemes, the main advantage of the proposed scheme eliminates the assumption that PKG is fully trusted. Besides, we show that the proposed scheme not only provides robust security properties, but also enjoys desirable efficiency for the real-world applications.

Keywords

Handoff authentication Identity-based cryptography Wireless network 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chaplin, C., Qi, E., Ptasinski, H., Walker, J., Li, S.: 802.11i overview, IEEE.802.11-04/0123r1 ( February 2005), http://www.drizzle.com/~aboba/IEEE
  2. 2.
    Mishra, A., Shin, M., Arbaugh, W.: Proactive Key Distribution Using Neighbor Graphs. IEEE Wireless Communication Magazine 11(1), 26–36 (2004)CrossRefGoogle Scholar
  3. 3.
    Pack, S., Choi, Y.: Fast Handoff Scheme based on mobility prediction in public wireless LAN systems. IEE Proc.-Commun. 151(5), 489–495 (2004)CrossRefGoogle Scholar
  4. 4.
    Hong, K., Jung, S., Wu, S.F.: A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 96–107. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  5. 5.
    Wang, H., Prasad, A.R.: Fast Authentication for Inter-domain Handover. In: de Souza, J.N., Dini, P., Lorenz, P. (eds.) ICT 2004. LNCS, vol. 3124, pp. 973–982. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Choi, J., Jung, S.: A Secure and Efficient Handover Authentication Based on Light-weight Diffie-Hellman on Mobile Node in FMIPv6. IEICE Transactions on Communications E-91B(2), 605–608 (2008)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Zhang, C., Lu, R., Ho, P., Chen, A.: A location Privacy Preserving Authentication Scheme in Vehicular Networks. In: WCNC 2008, pp. 2543–2548. IEEE Communications Society, New York (2008)Google Scholar
  8. 8.
    Choi, J., Jung, S.: A Handover Authentication Using Credentials Based on Chameleon Hashing. IEEE Communication Letters 14(1), 54–56 (2010)CrossRefGoogle Scholar
  9. 9.
    Krawczyk, H., Rabin, T.: Chameleon Signatures. In: NDSS 2000, pp. 143–154 (2000)Google Scholar
  10. 10.
    Yoon, E., Khan, M., Yoo, K.: Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing. IEICE Transactions on Information and Systems E93-D(12), 3400–3402 (2010)CrossRefGoogle Scholar
  11. 11.
    Kim, Y., Ren, W., Jo, J., Yang, M., Jiang, J., Zheng: SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-based Cryptography. In: ICC 2007, pp. 1570–1575. IEEE Communications Society, New York (2007)Google Scholar
  12. 12.
    Zhang, Y., Chen, X., Li, H., Cao, J.: Secure And Efficient Identity-Based Handoff Authentication Schemes. Security and Communication Networks, February 6 (2012), doi:10.1002/sec.421Google Scholar
  13. 13.
    Chen, X., Zhang, F., Susilo, W., Mu, Y.: Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 18–30. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  14. 14.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  15. 15.
    Chaum, D., van Antwerpen, H.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, Heidelberg (1990)Google Scholar
  16. 16.
    Ateniese, G., de Medeiros, B.: Identity-Based Chameleon Hash and Applications. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 164–180. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  17. 17.
    Chen, X., Zhang, F., Kim, K.: Chameleon Hashing Without Key Exposure. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 87–98. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  18. 18.
    Ateniese, G., de Medeiros, B.: On the Key Exposure Problem in Chameleon Hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 165–179. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  19. 19.
    Shamir, A., Tauman, Y.: Improved Online/Offline Signature Schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355–367. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  20. 20.
    Even, S., Goldreich, O., Micali, S.: On-Line/Off-Line Digital Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263–275. Springer, Heidelberg (1990)Google Scholar
  21. 21.
    Even, S., Goldreich, O., Micali, S.: On-line/Off-line Digital Signatures. Journal of Cryptology 9(1), 35–67 (1996)MathSciNetzbMATHCrossRefGoogle Scholar
  22. 22.
    Chen, X., Zhang, F., Tian, H., Wei, B., Susilo, W., Mu, Y., Lee, H., Kim, K.: Efficient Generic On-line/Off-line (Threshold) Signatures Without Key Exposure. Information Sciences 178(21), 4192–4203 (2008)MathSciNetzbMATHCrossRefGoogle Scholar
  23. 23.
    Harn, L., Hsin, W., Lin, C.: Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families. The Computer Journal 53(9), 1478–1484 (2010)CrossRefGoogle Scholar
  24. 24.
    Hess, F.: Efficient Identity Based Signature Schemes Based on Pairings. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  25. 25.
    Johnson, D., Menezes, A., Vanstone, S.: The Elliptic Curve Digital Signature Algorithm (ECDSA). International Journal of Information Security 1(1), 36–63 (2001)Google Scholar
  26. 26.
    Lenstra, A.K., Verheul, E.R.: Selecting Cryptographic Key Sizes. Journal of Cryptology 14(4), 255–293 (2001)MathSciNetzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Qi Han
    • 1
  • Yinghui Zhang
    • 1
  • Xiaofeng Chen
    • 1
  • Hui Li
    • 1
  • Jiaxiang Quan
    • 1
  1. 1.State Key Laboratory of Integrated Service Networks (ISN)Xidian UniversityXi’anP.R. China

Personalised recommendations