A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks

被引:0
作者
Yang, Xu [1 ]
Zhang, Yuexin [2 ]
Liu, Joseph K. [3 ]
Zeng, Yali [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Geelong, Vic, Australia
[3] Monash Univ, Fac Informat Technol, Clayton, Vic, Australia
来源
2016 IEEE TRUSTCOM/BIGDATASE/ISPA | 2016年
基金
中国国家自然科学基金;
关键词
Wireless networks; Handover authentication; Security; Efficiency; Trust and privacy preserving;
D O I
10.1109/TrustCom.2016.55
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various wireless communication technologies have been developed and deployed because of the increasing access requirements. As a result, it brings a great challenge for designing seamless handover authentication protocols in wireless networks, especially in ensuring security and efficiency. The innocent users in wireless networks hope that the Mobile Internet Service Provider can not only provide efficient Internet access, but also protect their privacy. To provide trust and privacy preserving services, in this paper, we propose a new handover authentication protocol for wireless networks. Specifically, the new protocol provides user anonymity and untraceability, and it achieves high efficiency. Compared with other handover authentication protocols, our proposed mechanism achieves outstanding features of security and efficiency.
引用
收藏
页码:138 / 143
页数:6
相关论文
共 15 条
[1]  
Bohak A, 2007, P ACM WIR INT C WICO
[2]   An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks [J].
Cao, Jin ;
Ma, Maode ;
Li, Hui .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (10) :3644-3650
[3]   A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges [J].
Cao, Xuefei ;
Kou, Weidong ;
Du, Xiaoni .
INFORMATION SCIENCES, 2010, 180 (15) :2895-2903
[4]   Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking [J].
Duan, Xiaoyu ;
Wang, Xianbin .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) :28-35
[5]   Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions [J].
He, Daojing ;
Chen, Chun ;
Chan, Sammy ;
Bu, Jiajun .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (01) :48-53
[6]   A new handover authentication protocol based on bilinear pairing functions for wireless networks [J].
He, Debiao ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2015, 18 (1-2) :67-74
[7]   Mutual authentication and key exchange protocols for roaming services in wireless mobile networks [J].
Jiang, Yixin ;
Lin, Chuang ;
Shen, Xuemin ;
Shi, Minghui .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (09) :2569-2577
[8]   Efficient authentication for fast handover in wireless mesh networks [J].
Li, Celia ;
Uyen Trang Nguyen ;
Hoang Lan Nguyen ;
Huda, Nurul .
COMPUTERS & SECURITY, 2013, 37 :124-142
[9]   Device-to-Device Communications for Enhancing Quality of Experience in Software Defined Multi-Tier LTE-A Networks [J].
Liu, Jiajia ;
Zhang, Shangwei ;
Kato, Nei ;
Ujikawa, Hirotaka ;
Suzuki, Kenichi .
IEEE NETWORK, 2015, 29 (04) :46-52
[10]   Time-Bound Anonymous Authentication for Roaming Networks [J].
Liu, Joseph K. ;
Chu, Cheng-Kang ;
Chow, Sherman S. M. ;
Huang, Xinyi ;
Au, Man Ho ;
Zhou, Jianying .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :178-189