Secure Handover Authentication Protocol Based on Bilinear Pairings

被引:29
|
作者
Tsai, Jia-Lun [1 ,2 ]
Lo, Nai-Wei [1 ,2 ]
Wu, Tzong-Chen [1 ,2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Taiwan Informat Secur Ctr TWISC, Taipei 106, Taiwan
关键词
Wireless networks; User unlinkability; Handover authentication; Bilinear pairings; SCHEME;
D O I
10.1007/s11277-013-1246-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Handover authentication protocol enables a mobile node to switch from one base station to another without loss or interruption of service when the node exits the transmission area of his or her current base station. This paper proposes a secure prime-order handover authentication protocol based on bilinear pairings. The proposed protocol adapts the concept of pseudonyms to provide user anonymity and user unlinkability. It withstands well-known security threats and achieves mutual authentication, user unlinkability. A batch signature verification mechanism to verify a mass of signatures is presented in our scheme. We also prove that our scheme is secure under random oracle.
引用
收藏
页码:1037 / 1047
页数:11
相关论文
共 50 条
  • [31] A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks
    Jianhong Zhou
    Maode Ma
    Yong Feng
    Thuy Ngoc Nguyen
    The Journal of Supercomputing, 2016, 72 : 2734 - 2751
  • [32] Efficient and secure outsourcing of bilinear pairings with single server
    Dong, Min
    Ren, Yanli
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [33] Secure Outsourced Bilinear Pairings Computation for Mobile Devices
    Hyla, Tomasz
    Pejas, Jerzy
    NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 519 - 529
  • [34] Efficient and secure outsourcing of bilinear pairings with single server
    Min Dong
    Yanli Ren
    Science China Information Sciences, 2018, 61
  • [35] Efficient and secure outsourcing of bilinear pairings with single server
    Min DONG
    Yanli REN
    Science China(Information Sciences), 2018, 61 (03) : 240 - 242
  • [36] Identity-based deniable authentication protocol from pairings
    Liao, I-En
    Lee, Cheng-Chi
    Shiang, Wufeng
    Hwang, Min-Shiang
    PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2006, : 112 - +
  • [37] An enhanced ID-based deniable authentication protocol on pairings
    Lim, Meng-Hui
    Lee, Sanggon
    Park, Youngho
    Lee, Hoonjae
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1008 - 1017
  • [38] Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
    Vo, Duc-Liem
    Lee, Hyunrok
    Yeun, Chan-Yeob
    Kim, Kwangjo
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (01) : 155 - 159
  • [39] Novel remote user authentication scheme using bilinear pairings
    Yang, Chen
    Ma, Wenping
    Wang, Xinmei
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 306 - +
  • [40] BILINEAR PAIRINGS-BASED THRESHOLD IDENTITY AUTHENTICATION SCHEME FOR AD HOC NETWORK
    Xu, Feng
    Zhu, Yuqi
    Ma, Hongxu
    Cai, Bin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (05): : 601 - 609