A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications

被引:0
作者
Guangsong Li
Yongbin Zeng
Hui Guang
Gang Yu
机构
[1] State Key Laboratory of Mathematical Engineering and Advanced Computing,
[2] Physical Education College of Zhengzhou University,undefined
来源
Wireless Personal Communications | 2020年 / 114卷
关键词
Anonymous; Authentication; Key establishment; Priority; Revocation; Wireless network;
D O I
暂无
中图分类号
学科分类号
摘要
A fast handover authentication protocol takes an important role for delay-sensitive applications in wireless networks. Mobile users may be granted different priorities depending on communication fees they paid. In this paper, we present a priority-aware anonymous handover authentication protocol using attribute-based cryptography. The proposed protocol realizes mutual authentication, user anonymity, session key establishment and user revocation etc. Particularly it obtains a charming property, namely, user priority. Compared with some existing schemes, it is more efficient while satisfying security.
引用
收藏
页码:2613 / 2627
页数:14
相关论文
共 71 条
[1]  
Duan X(2015)Authentication handover and privacy protection in 5G hetnets using software-defined networking Communications Magazine IEEE 53 28-35
[2]  
Wang X(2014)A privacy preserving vertical handover authentication scheme for WiMAX-WiFi networks Ksii Transactions on Internet & Information Systems 8 3250-3265
[3]  
Fu A(2014)A secure and efficient handover authentication protocol for wireless networks Sensors 14 11379-11394
[4]  
Zhang G(2015)A new handover authentication protocol based on bilinear pairing functions for wireless networks International Journal of Ad Hoc and Ubiquitous Computing 18 67-74
[5]  
Yu Y(2011)Privacy-preserving universal authentication protocol for wireless communications IEEE Transactions on Wireless Communications 10 431-436
[6]  
Zhu Z(2015)Enhanced secure sensor association and key management in wireless body area networks Journal of Communications & Networks 17 453-462
[7]  
Wang W(2015)Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity Information Sciences 321 162-178
[8]  
Hu L(2017)Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation Science China Information Sciences 60 052104-374
[9]  
He D(2011)A strong user authentication scheme with smart cards for wireless communications Computer Communications 34 367-3472
[10]  
Khan MK(2007)Anonymous and authenticated key exchange for roaming networks IEEE Transactions on Wireless Communications 6 3461-476