A Novel NTRU-Based Handover Authentication Scheme for Wireless Networks

被引:10
作者
Chen, Rui [1 ,2 ]
Peng, Dezhong [1 ,3 ]
机构
[1] Sichuan Univ, Coll Comp Sci, Chengdu 610065, Sichuan, Peoples R China
[2] Sichuan Normal Univ, Coll Comp Sci, Chengdu 610066, Sichuan, Peoples R China
[3] Chengdu Ruibei Yingte Informat Technol Ltd Co, Chengdu 610094, Sichuan, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless networks; handover authentication; number theory research unit; privacy preservation;
D O I
10.1109/LCOMM.2017.2786228
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A well-designed anonymous handover authentication (AHA) protocol is essential to enable mobile nodes to roam securely and seamlessly across multiple access points. In recent years, several protocols based on bilinear pairing and elliptic curve cryptosystem have been presented. However, their security are based on the discrete logarithm on elliptic curve, which has been proven unsafe by the emergence of quantum computers. To address the issue, we propose a new lightweight AHA scheme based on the number theory research unit public key cryptosystem for wireless networks. Security analysis and simulation experiment results show that in addition to achieving mutual authentication and greater security to resist known attacks, the proposed protocol has lower implementation complexity in comparison with up-to-date handover authentication schemes.
引用
收藏
页码:586 / 589
页数:4
相关论文
共 12 条
  • [1] [Anonymous], 2007, Secur. Distrib., Grid, mobile, Pervasive Comput.
  • [2] A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Islam, S. K. Hafizul
    Shon, Taeshik
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 93 (02) : 311 - 335
  • [3] Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks
    He, Daojing
    Chen, Chun
    Chan, Sammy
    Bu, Jiajun
    [J]. IEEE COMMUNICATIONS LETTERS, 2012, 16 (08) : 1270 - 1273
  • [4] Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions
    He, Daojing
    Chen, Chun
    Chan, Sammy
    Bu, Jiajun
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (01) : 48 - 53
  • [5] Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
    He, Debiao
    Wang, Ding
    Xie, Qi
    Chen, Kefei
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)
  • [6] Hoffstein J., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P267, DOI 10.1007/BFb0054868
  • [7] A New Privacy-Aware Handover Authentication Scheme for Wireless Networks
    Li, Guangsong
    Jiang, Qi
    Wei, Fushan
    Ma, Chuangui
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (02) : 581 - 589
  • [8] Shor P. W., 1994, Proceedings. 35th Annual Symposium on Foundations of Computer Science (Cat. No.94CH35717), P124, DOI 10.1109/SFCS.1994.365700
  • [9] Shor PW, 1997, SIAM J COMPUT, V26, P1484, DOI [10.1137/S0097539795293172, 10.1137/S0036144598347011]
  • [10] A survey on trust and reputation models for Web services: Single, composite, and communities
    Wahab, Omar Abdel
    Bentahar, Jamal
    Otrok, Hadi
    Mourad, Azzam
    [J]. DECISION SUPPORT SYSTEMS, 2015, 74 : 121 - 134