Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks

被引:2
|
作者
Kalpana, S. [1 ]
Chandramathi, S. [2 ]
机构
[1] Sri Krishna Coll Engn & Technol, Dept Informat Technol, Coimbatore 641008, Tamil Nadu, India
[2] SNS Coll Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2019年 / 22卷 / Suppl 5期
关键词
Heterogeneous; Standard deviation; Authentication; Blind signature; Ring signature; SECURE;
D O I
10.1007/s10586-017-1549-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the present 4G era, with the help of vertical handover (VHO), mobility and handover management are handled effectively across heterogeneous network as seamless and ubiquitous connections. The decision making process of VHO selects the best optimal access point. The research proposes a three tier model for handover and proposes two authentication algorithms, based on blind and ring signature, used during execution of VHO. The VHO model is developed in such a way that multiple parameters are used in every stage which includes selection of candidate networks during discovery, mathematical based decision making and authenticated execution. The network system allows the connections to be switched fairly without break or loss of QoS by properly combining the handover execution with a fair authentication procedure. This reduces unfairness and repudiation coming from distrusted network users. Our proposed model ensures continuous quality service through VHO bringing the solution in terms of correctness and efficiency.
引用
收藏
页码:12037 / 12047
页数:11
相关论文
共 50 条
  • [1] Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks
    S. Kalpana
    S. Chandramathi
    Cluster Computing, 2019, 22 : 12037 - 12047
  • [2] A proxy signature-based handover authentication scheme for LTE wireless networks
    Qiu, Yue
    Ma, Maode
    Wang, Xilei
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 83 : 63 - 71
  • [3] Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes
    Shim, Kyung-Ah
    An, Youngjoo
    IEEE ACCESS, 2021, 9 : 134427 - 134434
  • [4] ID-based, blind signature and ring signature from pairings
    Zhang, FG
    Kim, K
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 533 - 547
  • [5] Privacy in wireless sensor networks using ring signature
    Debnath, Ashmita
    Singaravelu, Pradheepkumar
    Verma, Shekhar
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2014, 26 (02) : 228 - 236
  • [6] A Ring Signature Suitable for Wireless Sensor Networks
    Du Yuejin
    Wang Yongjian
    CHINA COMMUNICATIONS, 2012, 9 (12) : 1 - 7
  • [7] Cooperative Authentication Scheme for Heterogeneous Networks Based on Identity Group Signature and Blockchain
    Cai, Juliang
    Tao, Xiaofeng
    Wang, Chenyu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (01) : 1394 - 1399
  • [8] Efficient Lattice-Based Ring Signature for Message Authentication in VANETs
    Mundhe, Pravin
    Yadav, Vijay Kumar
    Verma, Shekhar
    Venkatesan, S.
    IEEE SYSTEMS JOURNAL, 2020, 14 (04): : 5463 - 5474
  • [9] An Anonymous Authentication Protocol Based on Blind Signature for Internet of Things
    Zhao, Yue
    Yang, Bin
    Yang, Yarang
    2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 73 - 79
  • [10] Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs
    Mundhe, Pravin
    Yadav, Vijay Kumar
    Singh, Abhishek
    Verma, Shekhar
    Venkatesan, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) : 853 - 881