Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation

被引:34
|
作者
He, Debiao [1 ,2 ]
Wang, Ding [3 ]
Xie, Qi [4 ]
Chen, Kefei [4 ]
机构
[1] Wuhan Univ, Comp Sch, State Key Lab Software Engn, Wuhan 430072, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
[4] Hangzhou Normal Univ, Hangzhou Key Lab Cryptog & Network Secur, Hangzhou 311121, Zhejiang, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
mobile wireless network; handover authentication; anonymity; conditional privacy preservation; provable security; PRESERVING AUTHENTICATION; SECURE; SCHEME;
D O I
10.1007/s11432-016-0161-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the wireless communication technology and the popularity of mobile devices, the mobile wireless network (MWN) has been widely used in our daily life. Through the access point (AP), users could access the Internet anytime and anywhere using their mobile devices. Therefore, MWNs can bring much convenience to us. Due to the limitation of AP's coverage, the seamless handover frequently occurs in practical applications. How to guarantee the user's privacy and security and identify the real identity when he/she brings harm to the system becomes very challenging. To achieve such goals, many anonymous handover authentication (AHA) protocols have been proposed in the last several years. However, most of them have high computation costs because mobile nodes need to carry out the bilinear pairing operations or the hash-to-point operations. Besides, most of them cannot satisfy some critical requirements, such as non-traceability and perfect forward secrecy. In this paper, we first outline the security requirements of AHA protocols, and then propose a new AHA protocol to eliminate weaknesses existing in previous AHA protocols. Based on the hardness of two famous mathematical problems, we demonstrate that the proposed AHA protocol is secure against different kinds of attacks and can meet a variety of security requirements. It can be seen from the details of implementations that the proposed AHA protocol also has much less computation cost than three latest AHA protocols.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
    Debiao HE
    Ding WANG
    Qi XIE
    Kefei CHEN
    Science China(Information Sciences), 2017, 60 (05) : 113 - 129
  • [2] Authentication Protocol with Privacy Preservation for Handover in Wireless Mesh Networks
    Roy, Amit Kumar
    Khan, Ajoy Kumar
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 383 - 395
  • [3] Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks
    He, Daojing
    Bu, Jiajun
    Chan, Sammy
    Chen, Chun
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (03) : 616 - 622
  • [4] A provably secure pairing-free anonymous handover authentication protocol for mobile wireless networks
    Ogundoyin, Sunday Oyinlola
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2020, 18 (05) : 509 - 539
  • [5] A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks
    Yang, Xu
    Zhang, Yuexin
    Liu, Joseph K.
    Zeng, Yali
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 138 - 143
  • [6] Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks
    Zeng, Yongbin
    Guang, Hui
    Li, Guangsong
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [7] Fast Handover with Privacy Preserving Authentication Protocol for Mobile WiMAX Networks
    Abouhogail, Reham Abdellatif
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 361 - 375
  • [8] An anonymous batch handover authentication protocol for big flow wireless mesh networks
    Dongcheng Wang
    Li Xu
    Feng Wang
    Qikui Xu
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [9] An anonymous batch handover authentication protocol for big flow wireless mesh networks
    Wang, Dongcheng
    Xu, Li
    Wang, Feng
    Xu, Qikui
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [10] Lightweight handover authentication with location privacy-preserving in mobile wireless networks
    Liu, Ling
    Quan, Hanyu
    Liu, Xuefeng
    Zhang, Yuqing
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 280 - 288