Secure Handover Authentication Protocol Based on Bilinear Pairings

被引:30
作者
Tsai, Jia-Lun [1 ,2 ]
Lo, Nai-Wei [1 ,2 ]
Wu, Tzong-Chen [1 ,2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Taiwan Informat Secur Ctr TWISC, Taipei 106, Taiwan
关键词
Wireless networks; User unlinkability; Handover authentication; Bilinear pairings; SCHEME;
D O I
10.1007/s11277-013-1246-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Handover authentication protocol enables a mobile node to switch from one base station to another without loss or interruption of service when the node exits the transmission area of his or her current base station. This paper proposes a secure prime-order handover authentication protocol based on bilinear pairings. The proposed protocol adapts the concept of pseudonyms to provide user anonymity and user unlinkability. It withstands well-known security threats and achieves mutual authentication, user unlinkability. A batch signature verification mechanism to verify a mass of signatures is presented in our scheme. We also prove that our scheme is secure under random oracle.
引用
收藏
页码:1037 / 1047
页数:11
相关论文
共 25 条
[1]  
[Anonymous], P FC FEB 19 22
[2]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[3]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[4]   Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication [J].
Chang, Chin-Chen ;
Le, Hai-Duong ;
Chang, Ching-Hsiang .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 71 (01) :425-437
[5]   Enhanced authentication scheme with anonymity for roaming service in global mobility networks [J].
Chang, Chin-Chen ;
Lee, Chia-Yin ;
Chi, Yen-Chang .
COMPUTER COMMUNICATIONS, 2009, 32 (04) :611-618
[6]  
CHOI J, 2009, NEW2AN 2009, V5764, P291
[7]   A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6 [J].
Choi, Jaeduck ;
Jung, Souhwan .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (02) :605-608
[8]  
Choi KY, 2005, LECT NOTES COMPUT SC, V3574, P494
[9]  
Freeman DM, 2010, LECT NOTES COMPUT SC, V6110, P44
[10]   Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes [J].
Garg, Sanjam ;
Kumarasubramanian, Abishek ;
Sahai, Amit ;
Waters, Brent .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :121-130