OTFS-Based Efficient Handover Authentication Scheme with Privacy-Preserving for High Mobility Scenarios

被引:1
|
作者
Li, Dawei [1 ]
Liu, Di [1 ]
Sun, Yu [1 ]
Liu, Jianwei [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
关键词
high mobility condition; handover authentication; privacy-preserving; Tamarin; OTFS; MODULATION;
D O I
10.23919/JCC.2023.01.004
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Handover authentication in high mobil-ity scenarios is characterized by frequent and short-term parallel execution. Moreover, the penetrationloss and Doppler frequency shift caused by high speedalso lead to the deterioration of network link qual-ity. Therefore, high mobility scenarios require han-dover schemes with less handover overhead. How-ever, some existing schemes that meet this require-ment cannot provide strong security guarantees, whilesome schemes that can provide strong security guar-antees have large handover overheads. To solve thisdilemma, we propose a privacy-preserving handoverauthentication scheme that can provide strong secu-rity guarantees with less computational cost. Based onOrthogonal Time Frequency Space (OTFS) link andKey Encapsulation Mechanism (KEM), we establishthe shared key between protocol entities in the initialauthentication phase, thereby reducing the overhead inthe handover phase. Our proposed scheme can achievemutual authentication and key agreement among theuser equipment, relay node, and authentication server.We demonstrate that our proposed scheme can achieveuser anonymity, unlinkability, perfect forward secrecy,and resistance to various attacks through security anal-ysis including the Tamarin. The performance evalua-tion results show that our scheme has a small computa-tional cost compared with other schemes and can also provide a strong guarantee of security properties
引用
收藏
页码:36 / 49
页数:14
相关论文
共 50 条
  • [1] OTFS-Based Efficient Handover Authentication Scheme with Privacy-Preserving for High Mobility Scenarios
    Dawei Li
    Di Liu
    Yu Sun
    Jianwei Liu
    [J]. China Communications, 2023, 20 (01) : 36 - 49
  • [2] An Efficient Privacy-Preserving Handover Authentication Scheme for Mobile Wireless Network
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 490 - 505
  • [3] A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
    Wang, Changji
    Yuan, Yuan
    Wu, Jiayuan
    [J]. SENSORS, 2017, 17 (06):
  • [4] Efficient privacy-preserving authentication scheme for roaming consumer in global mobility networks
    Ostad-Sharif, Arezou
    Babamohammadi, Abolfazl
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (05)
  • [5] Efficient and privacy-preserving online face authentication scheme
    Li, Ming
    Yang, Xiaopeng
    Zhu, Hui
    Wang, Fengwei
    Li, Qi
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (05): : 205 - 215
  • [6] An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETs
    Cui, Jie
    Xu, Wenyu
    Sha, Kewei
    Zhong, Hong
    [J]. COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2017, 2018, 252 : 508 - 518
  • [7] An Efficient Blockchain-based Privacy-Preserving Authentication Scheme in VANET
    Xu, Shiyuan
    Chen, Xue
    Kong, Weimin
    Cao, Yibo
    He, Yunhua
    Xiao, Ke
    [J]. 2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING, 2023,
  • [8] An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications
    Ren, Jian
    Harn, Lein
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (03) : 1018 - 1025
  • [9] Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs
    Ming, Yang
    Cheng, Hongliang
    [J]. MOBILE INFORMATION SYSTEMS, 2019, 2019
  • [10] Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning
    Jiang, Yili
    Zhang, Kuan
    Qian, Yi
    Zhou, Liang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2227 - 2240