Abstract
An efficient and secure authentication protocol is essential to enable the mobile devices handover seamlessly to a different access point. However, due to the limited computation resource and battery capacity in mobile devices as well as the openness and insecurity of wireless channel, designing an efficient and secure handover scheme for wireless network is a challenging task. Furthermore, most of the existing handover schemes are vulnerable to various kinds of attacks and cannot yield good performance. According to the analysis of the current schemes, we summarize the security goals that should be fulfilled by the handover authentication scheme. In this paper, we present a new handover authentication and key agreement scheme on elliptic curve cryptosystem for mobile wireless networks which does not involve the trusted third party and provides privacy-preserving mutual authentication between mobile devices and the access point. The proposed scheme consists of three phases: system setup, handover preparation, handover authentication. We give the details of each phase. The theoretical analysis indicates that the proposed scheme achieves universal security features. The secrecy of the generated session key and mutual authentication of the proposed scheme are verified by ProVerif. In addition, performance comparison shows that the proposed scheme outperforms the related schemes in terms of computation cost and communication overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fu, L., et al.: Joint optimization of multicast energy in delay-constrained mobile wireless networks. IEEE/ACM Trans. Netw. 99, 633–646 (2018)
Pedersen, J., i Amat, A.G., Andriyanova, I., Brannstrom, F.: Distributed storage in mobile wireless networks with device-to-device communication. IEEE Trans. Commun. 64, 4862–4878 (2016)
He, D., Chen, C., Chan, S., Bu, J.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wirel. Commun. 11, 48–53 (2012)
He, D., Chen, C., Chan, S., Bu, J.: Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Commun. Lett. 16, 1270–1273 (2012)
Yeo, S.L., Yap, W.S., Liu, J.K., Henricksen, M.: Comments on “analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”. IEEE Commun. Lett. 17, 1521–1523 (2013)
Tsai, J.L., Lo, N.W., Wu, T.C.: Secure handover authentication protocol based on bilinear pairings. Wirel. Pers. Commun. 73, 1037–1047 (2013)
Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory 24, 106–110 (1978)
Wang, W., Hu, L.: A secure and efficient handover authentication protocol for wireless networks. Sensors 14, 11379–11394 (2014)
He, D., Khan, M.K., Kumar, N.: A new handover authentication protocol based on bilinear pairing functions for wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 18, 67–74 (2015)
Sun, H., Wen, Q., Zhang, H., Jin, Z.: A novel pairing-free certificateless authenticated key agreement protocol with provable security. Front. Comput. Sci. 7, 544–557 (2013)
Islam, S.H., Khan, M.K.: Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks. Int. J. Commun. Syst. 29, 2442–2456 (2016)
Chang, C.C., Huang, Y.C., Tsai, H.C.: Design and analysis of chameleon hashing based handover authentication scheme for wireless networks. J. Inf. Hiding Multimedia Sig. Process. 5, 107–116 (2014)
Xie, Y., Wu, L., Kumar, N., Shen, J.: Analysis and improvement of a privacy-aware handover authentication scheme for wireless network. Wirel. Pers. Commun. 93, 523–541 (2017)
Chaudhry, S.A., Farash, M.S., Naqvi, H., Islam, S.H., Shon, T.: A robust and efficient privacy aware handover authentication scheme for wireless networks. Wirel. Pers. Commun. Int. J. 93, 311–335 (2017)
Cao, J., Ma, M., Li, H.: An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Trans. Wirel. Commun. 11, 3644–3650 (2012)
Li, G., Jiang, Q., Wei, F., Ma, C.: A new privacy-aware handover authentication scheme for wireless networks. Wirel. Pers. Commun. 80, 581–589 (2015)
Wang, Y.Y., Liu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32, 583–585 (2009)
Juang, W.S., Chen, S.T., Liaw, H.T.: Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 55, 2551–2556 (2008)
Wen, F., Li, X.: An improved dynamic ID-based remote user authentication with key agreement scheme. Comput. Electr. Eng. 38, 381–387 (2012)
Tsai, J.L., Lo, N.W., Wu, T.C.: Novel anonymous authentication scheme using smart cards. IEEE Trans. Indus. Inform. 9, 2004–2013 (2013)
Kim, K.-k., Kim, M.-H.: Retracted: an enhanced anonymous authentication and key exchange scheme using smartcard. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 487–494. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37682-5_34
Khan, M.K., Kim, S.K., Alghathbar, K.: Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’. Comput. Commun. 34, 305–309 (2011)
Ma, C.G., Wang, D., Zhao, S.D.: Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst. 27, 2215–2227 (2015)
Huang, X., Chen, X., Li, J., Xiang, Y., Xu, L.: Further observations on smart-card-based password-authenticated key agreement in distributed systems. IEEE Trans. Parallel Distrib. Syst. 25, 1767–1775 (2014)
Wang, D., Wang, N., Wang, P., Qing, S.: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321, 162–178 (2015)
Ding, W., Ping, W.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. PP, 1 (2016)
Yang, X., Huang, X., Liu, J.K.: Efficient handover authentication with user anonymity and untraceability for mobile cloud computing. Future Gen. Comput. Syst. 62, 190–195 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Mo, J., Hu, Z., Lin, Y. (2018). An Efficient Privacy-Preserving Handover Authentication Scheme for Mobile Wireless Network. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_45
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)