Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks

被引:2
作者
Kalpana, S. [1 ]
Chandramathi, S. [2 ]
机构
[1] Sri Krishna Coll Engn & Technol, Dept Informat Technol, Coimbatore 641008, Tamil Nadu, India
[2] SNS Coll Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2019年 / 22卷 / Suppl 5期
关键词
Heterogeneous; Standard deviation; Authentication; Blind signature; Ring signature; SECURE;
D O I
10.1007/s10586-017-1549-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the present 4G era, with the help of vertical handover (VHO), mobility and handover management are handled effectively across heterogeneous network as seamless and ubiquitous connections. The decision making process of VHO selects the best optimal access point. The research proposes a three tier model for handover and proposes two authentication algorithms, based on blind and ring signature, used during execution of VHO. The VHO model is developed in such a way that multiple parameters are used in every stage which includes selection of candidate networks during discovery, mathematical based decision making and authenticated execution. The network system allows the connections to be switched fairly without break or loss of QoS by properly combining the handover execution with a fair authentication procedure. This reduces unfairness and repudiation coming from distrusted network users. Our proposed model ensures continuous quality service through VHO bringing the solution in terms of correctness and efficiency.
引用
收藏
页码:12037 / 12047
页数:11
相关论文
共 50 条
[41]   Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks [J].
Kumar, Amit ;
Om, Hari .
DIGITAL COMMUNICATIONS AND NETWORKS, 2020, 6 (03) :341-353
[42]   A Seamless Vertical Handover based on IEEE802.21 & IPv6 for Heterogeneous Wireless Network [J].
Tahir, Sabeen .
PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, :23-29
[43]   A Ticket-based Re-authentication Scheme for Fast Handover in Wireless Local Area Networks [J].
Li, Guangsong ;
Chen, Xi ;
Ma, Jianfeng .
2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
[44]   Ring signature-based blockchain for guaranteeing privacy preservation in online social networks [J].
Anitha Yarava ;
C. Shoba Bindu .
Multimedia Tools and Applications, 2024, 83 :47151-47174
[45]   A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks [J].
Shen, Limin ;
Ma, Jianfeng ;
Liu, Ximeng ;
Wei, Fushan ;
Miao, Meixia .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02) :546-554
[46]   A Multifactor Ring Signature based Authentication Scheme forQuality Assessment of IoMT Environment in COVID-19 Scenario [J].
Chatterjee, Kakali ;
Singh, Ashish ;
Neha ;
Yu, Keping .
ACM JOURNAL OF DATA AND INFORMATION QUALITY, 2023, 15 (02)
[47]   Quantum-resistant ring signature-based authentication scheme against secret key exposure for VANETs [J].
Yu, Xiaoling ;
Wang, Yuntao ;
Huang, Xin .
COMPUTER NETWORKS, 2025, 262
[48]   Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks [J].
Thumbur, Gowri ;
Rao, G. Srinivasa ;
Reddy, P. Vasudeva ;
Gayathri, N. B. ;
Reddy, D. V. R. Koti ;
Padmavathamma, M. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) :1908-1920
[49]   A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks [J].
Abdel-Malek, Mai A. ;
Akkaya, Kemal ;
Bhuyan, Arupjyoti ;
Ibrahim, Ahmed S. .
IEEE ACCESS, 2022, 10 :57485-57498
[50]   Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography [J].
He, Debiao ;
Zeadally, Sherali ;
Wu, Libing ;
Wang, Huaqun .
COMPUTER NETWORKS, 2017, 128 :154-163