Secure Handover Authentication Protocol Based on Bilinear Pairings

被引:29
|
作者
Tsai, Jia-Lun [1 ,2 ]
Lo, Nai-Wei [1 ,2 ]
Wu, Tzong-Chen [1 ,2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Taiwan Informat Secur Ctr TWISC, Taipei 106, Taiwan
关键词
Wireless networks; User unlinkability; Handover authentication; Bilinear pairings; SCHEME;
D O I
10.1007/s11277-013-1246-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Handover authentication protocol enables a mobile node to switch from one base station to another without loss or interruption of service when the node exits the transmission area of his or her current base station. This paper proposes a secure prime-order handover authentication protocol based on bilinear pairings. The proposed protocol adapts the concept of pseudonyms to provide user anonymity and user unlinkability. It withstands well-known security threats and achieves mutual authentication, user unlinkability. A batch signature verification mechanism to verify a mass of signatures is presented in our scheme. We also prove that our scheme is secure under random oracle.
引用
收藏
页码:1037 / 1047
页数:11
相关论文
共 50 条
  • [41] A novel remote user authentication scheme using bilinear pairings
    Das, Manik Lal
    Saxena, Ashutosh
    Gulati, Ved P.
    Phatak, Deepak B.
    COMPUTERS & SECURITY, 2006, 25 (03) : 184 - 189
  • [42] A protocol for secure seamless handover
    Prasad, AR
    Wang, H
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 32 - 38
  • [43] An energy efficient authentication scheme for wireless body area networks based on the bilinear pairings
    Dai, Songsong
    Jiang, Linmei
    He, Shan
    Guo, Donghui
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2018, 11 (04) : 232 - 241
  • [44] A remote user authentication scheme using bilinear pairings and ECC
    Jia, Zhongtian
    Zhang, Yuan
    Shao, Hua
    Lin, Yongzheng
    Wang, Jin
    ISDA 2006: SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, 2006, : 1091 - +
  • [45] A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks
    Xue, Kaiping
    Meng, Wei
    Li, Shaohua
    Wei, David S. L.
    Zhou, Huancheng
    Yu, Nenghai
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 5485 - 5499
  • [46] A secure and efficient handover authentication and key management protocol for 5G networks
    Huang, Jia Qi
    Qian, Yi
    Journal of Communications and Information Networks, 2020, 5 (01) : 40 - 49
  • [47] An Pre-authentication Protocol with Symmetric Keys for Secure Handover in Mobile WiMAX Networks
    Thuy Ngoc Nguyen
    Ma, Maode
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [48] A Lightweight and Secure Group Key Based Handover Authentication Protocol for the Software-Defined Space Information Network
    Xue, Kaiping
    Zhou, Huancheng
    Meng, Wei
    Wei, David S. L.
    Guizani, Mohsen
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (06) : 3673 - 3684
  • [49] Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks
    Islam, S. K. Hafizul
    Khan, Muhammad Khurram
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (17) : 2442 - 2456
  • [50] GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
    Modiri, Mohammad Mahdi
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (02): : 101 - 111