A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks

被引:0
作者
Shehzad Ashraf Chaudhry
Mohammad Sabzinejad Farash
Husnain Naqvi
SK Hafizul Islam
Taeshik Shon
机构
[1] International Islamic University,Department of Computer Science and Software Engineering
[2] Kharazmi University,Department of Computer Science and Information Systems
[3] Birla Institute of Technology and Science,Division of Information and Computer Engineering
[4] College of Information Technology,undefined
[5] Ajou University,undefined
来源
Wireless Personal Communications | 2017年 / 93卷
关键词
Handover authentication; Elliptic curve cryptography ; Impersonation attack; Random oracle model; ProVerif;
D O I
暂无
中图分类号
学科分类号
摘要
A handover authentication protocol ensures secure and seamless roaming over multiple access points. A number of such protocols are proposed, but most of these protocols are inefficient or insecure. Very recently, Li et al. (Wireless Pers Commun 80(2):581–589, 2015) proposed a privacy-aware handover authentication protocol, and claimed their protocol to be more lightweight and secure than existing protocols. However, our analysis identifies that Li et al.’s protocol is insecure against access point impersonation attack. As a remedy, we proposed an improved protocol to fix the security weakness of Li et al.’s protocol. The improved protocol achieves the provable security in the random oracle model against the hardness assumptions of the elliptic curve discrete logarithm problem and elliptic curve computational Diffie–Hellman problem. The proposed handover authentication protocol is also formally analyzed with the automated tool ProVerif. The improved protocol not only enhances the security but is more lightweight than other related protocols.
引用
收藏
页码:311 / 335
页数:24
相关论文
共 63 条
[1]  
Cao J(2012)An uniform handover authentication between e-utran and non-3g pp access networks IEEE Transactions on Wireless Communications 11 3644-3650
[2]  
Ma M(2015)A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security International Journal of Communication Systems 11 48-53
[3]  
Li H(2012)Secure and efficient handover authentication based on bilinear pairing functions IEEE Transactions on Wireless Communications 16 1270-1273
[4]  
Farash MS(2012)Analysis and improvement of a secure and efficient handover authentication for wireless networks IEEE Communications Letters 17 1521-1523
[5]  
Chaudhry SA(2013)Comments on “analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions” IEEE Communications Letters 73 1037-1047
[6]  
Heydari M(2013)Secure handover authentication protocol based on bilinear pairings Wireless Personal Communications 67 547-558
[7]  
Sadough SMS(2012)A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile network Annals of Telecommunications 90 2244-2258
[8]  
Kumari S(2013)Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography International Journal of Computer Mathematics 62 616-622
[9]  
Khan MK(2013)Handauth: Efficient handover authentication with conditional privacy for wireless networks IEEE Transactions on Computers 67 547-558
[10]  
He D(2012)A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks Annals of Telecommunications 90 2244-2258