Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks

被引:4
|
作者
Zeng, Yongbin [1 ]
Guang, Hui [2 ]
Li, Guangsong [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
[2] Zhengzhou Univ, Phys Educ Coll, Zhengzhou 450044, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
SECURE;
D O I
10.1155/2018/8470949
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile wireless networks are widely used in our daily lives. Seamless handover occurs frequently and how to guarantee security and efficiency during handover procedure is a major challenge. A handover authentication protocol with nice properties can achieve goals. Protocols proposed in recent years more or less have some security vulnerability. In this paper, we outline security requirements for handover authentication protocols and then propose an anonymous protocol based on a new attribute-based signature scheme. The proposed protocol realizes conditional privacy preserving, user revocation, and session key update as well as mutual authentication and anonymity. Besides, it achieves fine-grained access control due to attributes representing real identity. What is more, experiment shows the proposed protocol has a superior performance.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
    He, Debiao
    Zhang, Yuanyuan
    Chen, Jianhua
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 229 - 243
  • [22] Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
    Debiao He
    Yuanyuan Zhang
    Jianhua Chen
    Wireless Personal Communications, 2014, 74 : 229 - 243
  • [23] New attribute-based authentication and its application in anonymous cloud access service
    Li, Jin
    Chen, Xiaofeng
    Huang, Xinyi
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2015, 11 (01) : 125 - 141
  • [24] An anonymous wireless authentication protocol based on proxy signature
    Jiang, Chunlin
    Jia, Weijia
    Gu, Ke
    Journal of Computational Information Systems, 2012, 8 (02): : 541 - 548
  • [25] An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks
    Xu, Cheng
    Huang, Xiaohong
    Ma, Maode
    Bao, Hong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [26] New attribute-based encryption schemes with anonymous authentication and time limitation in fog computing
    Hafizpour, Hadis
    Shiri, Mohammad Ebrahim
    Rahmani, Amir Masoud
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [27] An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 : 133 - 144
  • [28] An Improved Fuzzy Attribute-Based Authentication
    Yun, Jong Pil
    Kim, Hyoseung
    Lee, Dong Hoon
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [29] A Dynamic Attribute-Based Authentication Scheme
    Yang, Huihui
    Oleshchuk, Vladimir A.
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 106 - 118
  • [30] Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2014, 14 (10): : 995 - 1006