Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks

被引:2
作者
Kalpana, S. [1 ]
Chandramathi, S. [2 ]
机构
[1] Sri Krishna Coll Engn & Technol, Dept Informat Technol, Coimbatore 641008, Tamil Nadu, India
[2] SNS Coll Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2019年 / 22卷 / Suppl 5期
关键词
Heterogeneous; Standard deviation; Authentication; Blind signature; Ring signature; SECURE;
D O I
10.1007/s10586-017-1549-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the present 4G era, with the help of vertical handover (VHO), mobility and handover management are handled effectively across heterogeneous network as seamless and ubiquitous connections. The decision making process of VHO selects the best optimal access point. The research proposes a three tier model for handover and proposes two authentication algorithms, based on blind and ring signature, used during execution of VHO. The VHO model is developed in such a way that multiple parameters are used in every stage which includes selection of candidate networks during discovery, mathematical based decision making and authenticated execution. The network system allows the connections to be switched fairly without break or loss of QoS by properly combining the handover execution with a fair authentication procedure. This reduces unfairness and repudiation coming from distrusted network users. Our proposed model ensures continuous quality service through VHO bringing the solution in terms of correctness and efficiency.
引用
收藏
页码:12037 / 12047
页数:11
相关论文
共 50 条
  • [21] A Blind Ring Signature Based on the Short Integer Solution Problem
    Huy Quoc Le
    Dung Hoang Duong
    Susilo, Willy
    INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 92 - 111
  • [22] A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation
    Lin, Chia-Chen
    Chang, Chin-Chen
    Zheng, Yao-Zhu
    SYMMETRY-BASEL, 2020, 12 (12): : 1 - 11
  • [23] Image Feature Based Authentication and Digital Signature for Wireless Data Transmission
    Ziaullah, Mohammad
    Shetty, Prakash
    Kamal, Shoaib
    2016 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2016,
  • [24] Ticket-Based Authentication for Fast Handover in Wireless Mesh Networks
    Xue Zhang
    Guangsong Li
    Wenbao Han
    Wireless Personal Communications, 2015, 85 : 1509 - 1523
  • [25] Ticket-Based Authentication for Fast Handover in Wireless Mesh Networks
    Zhang, Xue
    Li, Guangsong
    Han, Wenbao
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 1509 - 1523
  • [26] Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks
    Zeng, Yongbin
    Guang, Hui
    Li, Guangsong
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [27] Practical Identity-Based Signature for Wireless Sensor Networks
    Li, Fagen
    Zhong, Di
    Takagi, Tsuyoshi
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2012, 1 (06) : 637 - 640
  • [28] Vertical Handover Decision based on RBF Approach for Ubiquitous Wireless Networks
    Kunarak, Sunisa
    2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [29] A new handover authentication protocol based on bilinear pairing functions for wireless networks
    He, Debiao
    Khan, Muhammad Khurram
    Kumar, Neeraj
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2015, 18 (1-2) : 67 - 74
  • [30] A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment
    Castiglione, Aniello
    Palmieri, Francesco
    Chen, Chin-Ling
    Chang, Yao-Chung
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2016, 12 (01) : 34 - 48