Secure Handover Authentication Protocol Based on Bilinear Pairings

被引:29
|
作者
Tsai, Jia-Lun [1 ,2 ]
Lo, Nai-Wei [1 ,2 ]
Wu, Tzong-Chen [1 ,2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Taiwan Informat Secur Ctr TWISC, Taipei 106, Taiwan
关键词
Wireless networks; User unlinkability; Handover authentication; Bilinear pairings; SCHEME;
D O I
10.1007/s11277-013-1246-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Handover authentication protocol enables a mobile node to switch from one base station to another without loss or interruption of service when the node exits the transmission area of his or her current base station. This paper proposes a secure prime-order handover authentication protocol based on bilinear pairings. The proposed protocol adapts the concept of pseudonyms to provide user anonymity and user unlinkability. It withstands well-known security threats and achieves mutual authentication, user unlinkability. A batch signature verification mechanism to verify a mass of signatures is presented in our scheme. We also prove that our scheme is secure under random oracle.
引用
收藏
页码:1037 / 1047
页数:11
相关论文
共 50 条
  • [21] A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Hsiao, Kuei-Fang
    AD HOC & SENSOR WIRELESS NETWORKS, 2020, 47 (1-4) : 227 - 247
  • [22] An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    Li, Yuangang
    He, Debiao
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 37 : 112 - 121
  • [23] Efficient algorithms for secure outsourcing of bilinear pairings
    Chen, Xiaofeng
    Susilo, Willy
    Li, Jin
    Wong, Duncan S.
    Ma, Jianfeng
    Tang, Shaohua
    Tang, Qiang
    THEORETICAL COMPUTER SCIENCE, 2015, 562 : 112 - 121
  • [24] Optimistic Mix-net protocol based on bilinear pairings
    Li, L.-H., 1600, Editorial Board of Journal on Communications (34):
  • [25] A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 1 - 11
  • [26] A Provably Secure Certificate-based Signature Scheme with Bilinear Pairings
    Zhang Jianhong
    Chen Hua
    Yang Yixian
    ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 1271 - +
  • [27] A provably secure ECC-based access and handover authentication protocol for space information networks
    Guo, Junyan
    Du, Ye
    Zhang, Yahang
    Li, Meihong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 193
  • [28] A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 287 - 294
  • [29] Electronic voting protocol from bilinear pairings
    Gallegos-Garcia, Gina
    Gomez-Cardenas, Roberto
    Duchen-Sanchez, Gonzalo
    REVISTA FACULTAD DE INGENIERIA-UNIVERSIDAD DE ANTIOQUIA, 2010, (56): : 234 - 244
  • [30] A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks
    Zhou, Jianhong
    Ma, Maode
    Feng, Yong
    Thuy Ngoc Nguyen
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (07): : 2734 - 2751