A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks

被引:3
|
作者
Wang, Changji [1 ]
Yuan, Yuan [2 ]
Wu, Jiayuan [3 ]
机构
[1] Guangdong Univ Foreign Studies, Sch Informat Sci & Technol, Guangzhou 510420, Guangdong, Peoples R China
[2] Guangdong Univ Foreign Studies, Sch Finance, Guangzhou 510420, Guangdong, Peoples R China
[3] Sun Yat Sen Univ, Sch Data Sci & Comp, Guangzhou 510420, Guangdong, Peoples R China
来源
SENSORS | 2017年 / 17卷 / 06期
基金
中国国家自然科学基金;
关键词
wireless networks; handover authentication; identity-based signature; blind signature; authenticated key establishment; elliptic curve cryptography; PROTOCOL; SECURE;
D O I
10.3390/s17061446
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Privacy-Preserving Authentication Scheme for Wireless Networks
    Hazazi, Manal
    Tian, Yuan
    Al-Rodhaan, Mznah
    [J]. 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [2] An Efficient Privacy-Preserving Handover Authentication Scheme for Mobile Wireless Network
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 490 - 505
  • [3] Lightweight handover authentication with location privacy-preserving in mobile wireless networks
    Liu, Ling
    Quan, Hanyu
    Liu, Xuefeng
    Zhang, Yuqing
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 280 - 288
  • [4] A Privacy Preserving Handover Authentication Scheme for EAP-based Wireless Networks
    Jing, Qi
    Zhang, Yuqing
    Fu, Anmin
    Liu, Xuefeng
    [J]. 2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [5] Efficient and privacy-preserving authentication scheme for wireless body area networks
    Shuai, Mengxia
    Liu, Bin
    Yu, Nenghai
    Xiong, Ling
    Wang, Changhui
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [6] A New Privacy-Aware Handover Authentication Scheme for Wireless Networks
    Guangsong Li
    Qi Jiang
    Fushan Wei
    Chuangui Ma
    [J]. Wireless Personal Communications, 2015, 80 : 581 - 589
  • [7] A New Privacy-Aware Handover Authentication Scheme for Wireless Networks
    Li, Guangsong
    Jiang, Qi
    Wei, Fushan
    Ma, Chuangui
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (02) : 581 - 589
  • [8] A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks
    Yang, Xu
    Zhang, Yuexin
    Liu, Joseph K.
    Zeng, Yali
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 138 - 143
  • [9] Efficient Privacy-Preserving Authentication in Wireless Mobile Networks
    Jo, Hyo Jin
    Paik, Jung Ha
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (07) : 1469 - 1481
  • [10] A Privacy-Preserving Roaming Authentication Scheme for Ubiquitous Networks
    Zhou, You-sheng
    Zhou, Jun-feng
    Wang, Feng
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 463 - 471