Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network

被引:25
|
作者
Xie, Yong [1 ,2 ]
Wu, Libing [1 ,3 ]
Kumar, Neeraj [4 ]
Shen, Jian [5 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
[2] Jingdezhen Ceram Inst, Sch Informat & Engn, Jingdezhen, Peoples R China
[3] Wuhan Univ, State Key Lab Software Engn, Wuhan, Peoples R China
[4] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
[5] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Handover; Authentication scheme; ID-based authentication; Anonymity; SECURITY; PROTOCOL; EFFICIENCY; SERVICES;
D O I
10.1007/s11277-016-3352-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To enable mobile device seamlessly and securely handover to different access points, a secure and efficient handover authentication scheme is desperately required. However, it is an arduous issue to design a secure handover scheme for wireless network because mobile nodes are limited in power and computational capability, handover latency is severely restricted and wireless network is opening and insecure. To deal the issue, we propose an improved privacy-aware handover authentication scheme for wireless network. We give the security proof to demonstrate our proposed scheme can provide mutual authentication and secure key agreement, and can resist all kinds of known security attacks. Compared with up-to-date similar handover schemes, our proposed scheme not only meets the security requirements of handover scheme, but also decreases computation cost and communication cost. Therefore, our proposed scheme is more suitable for wireless network than the similar schemes.
引用
收藏
页码:523 / 541
页数:19
相关论文
共 50 条
  • [21] Privacy-aware smart card based biometric authentication scheme for e-health
    Li Chen
    Ke Zhang
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 1353 - 1365
  • [22] Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes
    Hossain, Mahmud
    Hasan, Ragib
    [J]. 2017 IEEE 2ND INTERNATIONAL CONGRESS ON INTERNET OF THINGS (IEEE ICIOT), 2017, : 1 - 8
  • [24] An Efficient Privacy-Aware Routing Scheme Against Eavesdroppers in Wireless Sensor Networks
    Zhou, Liming
    Wen, Qiaoyan
    Zhang, Hua
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 63 - 68
  • [25] Privacy-Aware Passive Network Monitoring
    Gogoulos, Fotios
    Antonakopoulou, Anna
    Mousas, Aziz S.
    Lioudakis, Georgios V.
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    [J]. 13TH PANHELLENIC CONFERENCE ON INFORMATICS, PROCEEDINGS, 2009, : 171 - 175
  • [26] An Improved Privacy-Aware Handoff Authentication Protocol for VANETs
    Zhou, Zhiping
    Zhang, Huigen
    Sun, Ziwen
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (03) : 3601 - 3618
  • [27] Hyperelliptic Curve Cryptography-Based Lightweight Privacy-Aware Secure Authentication Scheme for Vehicular Ad Hoc Network
    Yadav, Kirti A.
    Vijayakumar, P.
    [J]. INTELLIGENT EMBEDDED SYSTEMS, ICNETS2, VOL II, 2018, 492 : 83 - 90
  • [28] A Privacy-aware Query Authentication Index for Database Outsourcing
    Jang, Miyoung
    Yoon, Min
    Chang, Jae-Woo
    [J]. 2014 INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2014, : 72 - 76
  • [29] Privacy-Aware Image Authentication from Cryptographic Primitives
    Chen, Haixia
    Huang, Xinyi
    Wu, Wei
    Mu, Yi
    [J]. COMPUTER JOURNAL, 2021, 64 (08): : 1178 - 1192
  • [30] A privacy-aware overlay routing scheme in WSNs
    Kazatzopoulos, L.
    Delakouridis, K.
    Marias, G. F.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (07) : 729 - 743