Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks

被引:4
|
作者
Zeng, Yongbin [1 ]
Guang, Hui [2 ]
Li, Guangsong [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
[2] Zhengzhou Univ, Phys Educ Coll, Zhengzhou 450044, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
SECURE;
D O I
10.1155/2018/8470949
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile wireless networks are widely used in our daily lives. Seamless handover occurs frequently and how to guarantee security and efficiency during handover procedure is a major challenge. A handover authentication protocol with nice properties can achieve goals. Protocols proposed in recent years more or less have some security vulnerability. In this paper, we outline security requirements for handover authentication protocols and then propose an anonymous protocol based on a new attribute-based signature scheme. The proposed protocol realizes conditional privacy preserving, user revocation, and session key update as well as mutual authentication and anonymity. Besides, it achieves fine-grained access control due to attributes representing real identity. What is more, experiment shows the proposed protocol has a superior performance.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
    He, Debiao
    Wang, Ding
    Xie, Qi
    Chen, Kefei
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)
  • [2] A fine-grained anonymous handover authentication protocol based on consortium blockchain for wireless networks
    Li, Guangsong
    Chen, Wei
    Zhang, Bin
    Lu, Siqi
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 157 : 157 - 167
  • [3] A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications
    Li, Guangsong
    Zeng, Yongbin
    Guang, Hui
    Yu, Gang
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (03) : 2613 - 2627
  • [4] A new handover authentication protocol based on bilinear pairing functions for wireless networks
    He, Debiao
    Khan, Muhammad Khurram
    Kumar, Neeraj
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2015, 18 (1-2) : 67 - 74
  • [5] PAPAR: Pairing Based Authentication Protocol with Anonymous Roaming for Wireless Mesh Networks
    Sultan, Nazatul Haque
    Sarma, Nityananda
    2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT), 2014, : 155 - 160
  • [6] An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks
    Xu, Cheng
    Huang, Xiaohong
    Ma, Maode
    Bao, Hong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [7] New attribute-based encryption schemes with anonymous authentication and time limitation in fog computing
    Hafizpour, Hadis
    Shiri, Mohammad Ebrahim
    Rahmani, Amir Masoud
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [8] Anonymous attribute-based designated verifier signature
    Blazy, Olivier
    Brouilhet, Laura
    Conchon, Emmanuel
    Klingler, Mathieu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 14 (10) : 1 - 11
  • [9] Attribute-based handshake protocol for mobile healthcare social networks
    Liu, Yi
    Wang, Hao
    Li, Tong
    Li, Ping
    Ling, Jie
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 873 - 880
  • [10] A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks
    Zhu, Lianghong
    Xiang, Huaikun
    Zhang, Kai
    SYMMETRY-BASEL, 2022, 14 (01):