Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network

被引:25
|
作者
Xie, Yong [1 ,2 ]
Wu, Libing [1 ,3 ]
Kumar, Neeraj [4 ]
Shen, Jian [5 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
[2] Jingdezhen Ceram Inst, Sch Informat & Engn, Jingdezhen, Peoples R China
[3] Wuhan Univ, State Key Lab Software Engn, Wuhan, Peoples R China
[4] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
[5] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Handover; Authentication scheme; ID-based authentication; Anonymity; SECURITY; PROTOCOL; EFFICIENCY; SERVICES;
D O I
10.1007/s11277-016-3352-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To enable mobile device seamlessly and securely handover to different access points, a secure and efficient handover authentication scheme is desperately required. However, it is an arduous issue to design a secure handover scheme for wireless network because mobile nodes are limited in power and computational capability, handover latency is severely restricted and wireless network is opening and insecure. To deal the issue, we propose an improved privacy-aware handover authentication scheme for wireless network. We give the security proof to demonstrate our proposed scheme can provide mutual authentication and secure key agreement, and can resist all kinds of known security attacks. Compared with up-to-date similar handover schemes, our proposed scheme not only meets the security requirements of handover scheme, but also decreases computation cost and communication cost. Therefore, our proposed scheme is more suitable for wireless network than the similar schemes.
引用
收藏
页码:523 / 541
页数:19
相关论文
共 50 条
  • [41] An Efficient Handover Authentication Scheme with Location Privacy Preserving for EAP-based Wireless Networks
    Jing, Qi
    Zhang, Yuqing
    Liu, Xuefeng
    Fu, Anmin
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [42] A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Giri, Debasis
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4650 - 4666
  • [43] Lightweight privacy-aware secure authentication scheme for cyber-physical systems in the edge intelligence era
    Bakkiam Deebak, Deebak
    AL-Turjman, Fadi
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (13):
  • [44] MASHED: Security and privacy-aware mutual authentication scheme for heterogeneous and distributed mobile cloud computing services
    Olakanmi, Oladayo Olufemi
    Oke, Samuel Oluwaseye
    [J]. INFORMATION SECURITY JOURNAL, 2018, 27 (5-6): : 276 - 291
  • [45] An Efficient Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services without Bilinear Pairings
    Xiong, Ling
    Peng, Tu
    Peng, Dai-Yuan
    Liang, Hong-Bin
    Liu, Zhi-Cai
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (02) : 341 - 360
  • [46] Authentication Protocol with Privacy Preservation for Handover in Wireless Mesh Networks
    Roy, Amit Kumar
    Khan, Ajoy Kumar
    [J]. FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 383 - 395
  • [47] Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks
    He, Daojing
    Bu, Jiajun
    Chan, Sammy
    Chen, Chun
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (03) : 616 - 622
  • [48] A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks
    Yang, Xu
    Zhang, Yuexin
    Liu, Joseph K.
    Zeng, Yali
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 138 - 143
  • [49] A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
    Jiang, Qi
    Kumar, Neeraj
    Ma, Jianfeng
    Shen, Jian
    He, Debiao
    Chilamkurti, Naveen
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2017, 27 (03)
  • [50] Blockchain-Based Physically Secure and Privacy-Aware Anonymous Authentication Scheme for Fog-Based Vanets
    Subramani, Jegadeesan
    Maria, Azees
    Rajasekaran, Arun Sekar
    Al-Turjman, Fadi
    Gopal, Mahesh
    [J]. IEEE ACCESS, 2023, 11 : 17138 - 17150