Handover Authentication for Mobile Networks: Security and Efficiency Aspects

被引:49
作者
He, Daojing [1 ]
Chan, Sammy [2 ]
Guizani, Mohsen [3 ]
机构
[1] E China Normal Univ, Software Engn Inst, Guangzhou, Guangdong, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
[3] Qatar Univ, Grad Studies, Doha, Qatar
来源
IEEE NETWORK | 2015年 / 29卷 / 03期
基金
美国国家科学基金会;
关键词
WIRELESS; PROTOCOL;
D O I
10.1109/MNET.2015.7113232
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task because wireless networks are susceptible to attacks, and mobile nodes have limited power and processing capability. In this article, we identify the security and efficiency requirements of a good handover authentication protocol and analyze the existing related protocols, and show that many such protocols are either insecure or inefficient. Then we review a recently proposed protocol named PairHand, which has been shown to outperform all other protocols on security and efficiency. Furthermore, we propose a novel protocol named HashHand that not only inherits the merits of PairHand and efficiently eliminates its security vulnerabilities, but also provides a session key update mechanism. Experiments using our implementation on resource-limited laptop PCs show that HashHand is feasible for practical mobile networks.
引用
收藏
页码:96 / 103
页数:8
相关论文
共 15 条
[1]  
*3GPP, 2002, 33102 3GPP TS
[2]  
An-Ni Shen, 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC), P2543, DOI 10.1109/WCNC.2012.6214227
[3]   Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks [J].
Avula, Mallikarjun ;
Lee, Sang-Gon ;
Yoo, Seong-Moo .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (06) :1982-2004
[4]   An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks [J].
Chang, Chin-Chen ;
Tsai, Hao-Chuan .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (11) :3346-3353
[5]   A Handover Authentication Using Credentials Based on Chameleon Hashing [J].
Choi, Jaeduck ;
Jung, Souhwan .
IEEE COMMUNICATIONS LETTERS, 2010, 14 (01) :54-56
[6]  
[ETSI European Telecommunications Standards Institute ETSI], 1993, 0209 ETSI GSM
[7]  
Freeman DM, 2010, LECT NOTES COMPUT SC, V6110, P44
[8]  
Han Q., P INCOS 12, P222
[9]   Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks [J].
He, Daojing ;
Chen, Chun ;
Chan, Sammy ;
Bu, Jiajun .
IEEE COMMUNICATIONS LETTERS, 2012, 16 (08) :1270-1273
[10]   Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions [J].
He, Daojing ;
Chen, Chun ;
Chan, Sammy ;
Bu, Jiajun .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (01) :48-53