Skip to main content

An Efficient Privacy-Preserving Handover Authentication Scheme for Mobile Wireless Network

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Included in the following conference series:

Abstract

An efficient and secure authentication protocol is essential to enable the mobile devices handover seamlessly to a different access point. However, due to the limited computation resource and battery capacity in mobile devices as well as the openness and insecurity of wireless channel, designing an efficient and secure handover scheme for wireless network is a challenging task. Furthermore, most of the existing handover schemes are vulnerable to various kinds of attacks and cannot yield good performance. According to the analysis of the current schemes, we summarize the security goals that should be fulfilled by the handover authentication scheme. In this paper, we present a new handover authentication and key agreement scheme on elliptic curve cryptosystem for mobile wireless networks which does not involve the trusted third party and provides privacy-preserving mutual authentication between mobile devices and the access point. The proposed scheme consists of three phases: system setup, handover preparation, handover authentication. We give the details of each phase. The theoretical analysis indicates that the proposed scheme achieves universal security features. The secrecy of the generated session key and mutual authentication of the proposed scheme are verified by ProVerif. In addition, performance comparison shows that the proposed scheme outperforms the related schemes in terms of computation cost and communication overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fu, L., et al.: Joint optimization of multicast energy in delay-constrained mobile wireless networks. IEEE/ACM Trans. Netw. 99, 633–646 (2018)

    Article  Google Scholar 

  2. Pedersen, J., i Amat, A.G., Andriyanova, I., Brannstrom, F.: Distributed storage in mobile wireless networks with device-to-device communication. IEEE Trans. Commun. 64, 4862–4878 (2016)

    Google Scholar 

  3. He, D., Chen, C., Chan, S., Bu, J.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wirel. Commun. 11, 48–53 (2012)

    Article  Google Scholar 

  4. He, D., Chen, C., Chan, S., Bu, J.: Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Commun. Lett. 16, 1270–1273 (2012)

    Article  Google Scholar 

  5. Yeo, S.L., Yap, W.S., Liu, J.K., Henricksen, M.: Comments on “analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”. IEEE Commun. Lett. 17, 1521–1523 (2013)

    Article  Google Scholar 

  6. Tsai, J.L., Lo, N.W., Wu, T.C.: Secure handover authentication protocol based on bilinear pairings. Wirel. Pers. Commun. 73, 1037–1047 (2013)

    Article  Google Scholar 

  7. Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory 24, 106–110 (1978)

    Google Scholar 

  8. Wang, W., Hu, L.: A secure and efficient handover authentication protocol for wireless networks. Sensors 14, 11379–11394 (2014)

    Article  Google Scholar 

  9. He, D., Khan, M.K., Kumar, N.: A new handover authentication protocol based on bilinear pairing functions for wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 18, 67–74 (2015)

    Google Scholar 

  10. Sun, H., Wen, Q., Zhang, H., Jin, Z.: A novel pairing-free certificateless authenticated key agreement protocol with provable security. Front. Comput. Sci. 7, 544–557 (2013)

    Article  MathSciNet  Google Scholar 

  11. Islam, S.H., Khan, M.K.: Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks. Int. J. Commun. Syst. 29, 2442–2456 (2016)

    Google Scholar 

  12. Chang, C.C., Huang, Y.C., Tsai, H.C.: Design and analysis of chameleon hashing based handover authentication scheme for wireless networks. J. Inf. Hiding Multimedia Sig. Process. 5, 107–116 (2014)

    Google Scholar 

  13. Xie, Y., Wu, L., Kumar, N., Shen, J.: Analysis and improvement of a privacy-aware handover authentication scheme for wireless network. Wirel. Pers. Commun. 93, 523–541 (2017)

    Article  Google Scholar 

  14. Chaudhry, S.A., Farash, M.S., Naqvi, H., Islam, S.H., Shon, T.: A robust and efficient privacy aware handover authentication scheme for wireless networks. Wirel. Pers. Commun. Int. J. 93, 311–335 (2017)

    Article  Google Scholar 

  15. Cao, J., Ma, M., Li, H.: An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Trans. Wirel. Commun. 11, 3644–3650 (2012)

    Article  Google Scholar 

  16. Li, G., Jiang, Q., Wei, F., Ma, C.: A new privacy-aware handover authentication scheme for wireless networks. Wirel. Pers. Commun. 80, 581–589 (2015)

    Article  Google Scholar 

  17. Wang, Y.Y., Liu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32, 583–585 (2009)

    Article  Google Scholar 

  18. Juang, W.S., Chen, S.T., Liaw, H.T.: Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 55, 2551–2556 (2008)

    Article  Google Scholar 

  19. Wen, F., Li, X.: An improved dynamic ID-based remote user authentication with key agreement scheme. Comput. Electr. Eng. 38, 381–387 (2012)

    Article  Google Scholar 

  20. Tsai, J.L., Lo, N.W., Wu, T.C.: Novel anonymous authentication scheme using smart cards. IEEE Trans. Indus. Inform. 9, 2004–2013 (2013)

    Article  Google Scholar 

  21. Kim, K.-k., Kim, M.-H.: Retracted: an enhanced anonymous authentication and key exchange scheme using smartcard. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 487–494. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37682-5_34

    Chapter  Google Scholar 

  22. Khan, M.K., Kim, S.K., Alghathbar, K.: Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’. Comput. Commun. 34, 305–309 (2011)

    Article  Google Scholar 

  23. Ma, C.G., Wang, D., Zhao, S.D.: Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst. 27, 2215–2227 (2015)

    Article  Google Scholar 

  24. Huang, X., Chen, X., Li, J., Xiang, Y., Xu, L.: Further observations on smart-card-based password-authenticated key agreement in distributed systems. IEEE Trans. Parallel Distrib. Syst. 25, 1767–1775 (2014)

    Article  Google Scholar 

  25. Wang, D., Wang, N., Wang, P., Qing, S.: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321, 162–178 (2015)

    Article  Google Scholar 

  26. Ding, W., Ping, W.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. PP, 1 (2016)

    Google Scholar 

  27. http://prosecco.gforge.inria.fr/personal/bblanche/proverif/

  28. Yang, X., Huang, X., Liu, J.K.: Efficient handover authentication with user anonymity and untraceability for mobile cloud computing. Future Gen. Comput. Syst. 62, 190–195 (2016)

    Article  Google Scholar 

  29. https://crypto.stanford.edu/pbc/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiaqing Mo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mo, J., Hu, Z., Lin, Y. (2018). An Efficient Privacy-Preserving Handover Authentication Scheme for Mobile Wireless Network. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics