Abstract
Many handover authentication protocols for wireless networks have been proposed in recent years. However, most of them are either inefficient or insecure, or lack sufficient concern for user privacy. In this paper, we propose a new design idea for handover authentication protocol by using pseudonym-based cryptography and a variant of the SIGMA (Sign-and-MAC) approach, and present a new handover authentication protocol for wireless networks from elliptic curve cryptography. The proposed protocol satisfies all desirable basic security and privacy requirements, including perfect forward secrecy, user anonymity and un-traceability, conditional privacy preservation and so on. The performance analysis shows that our proposed protocol is more efficient than previous handover authentication protocols in terms of computation and communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Park, S.H., Ganz, A., Ganz, Z.: Security protocol for IEEE 802.11 wireless local area network. Mob. Netw. Appl. 3(3), 237–246 (1998)
Zekri, D., Defude, B., Delot, T.: Building, sharing and exploiting spatio-temporal aggregates in vehicular networks. Mob. Inf. Syst. 10(3), 259–285 (2014)
Oliveira, L., et al.: Ubiquitous monitoring solution for wireless sensor networks with push notifications and end-to-end connectivity. Mob. Inf. Syst. 10(1), 19–35 (2014)
Mohammad, G., et al.: A survey on wireless body area networks for eHealthcare systems in residential environments. Sensors 16(6), 831 (2016). https://doi.org/10.3390/s16060831
He, D.J., et al.: A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3), 367–374 (2011)
He, D.J., et al.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wirel. Commun. 11(1), 48–53 (2012)
He, D.J., Chen, C., Chan, S., Bu, J.J.: Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Commun. Lett. 16(8), 1270–1273 (2012)
He, D.J., Bu, J.J., Chan, S., Chen, C.: Handauth: efficient handover authentication with conditional privacy for wireless networks. IEEE Trans. Comput. 62(3), 616–622 (2013)
Yeo, S.L., et al.: Comments on “analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”. IEEE Commun. Lett. 17(8), 1521–1523 (2013)
Tsai, J.L., Lo, N.W., Wu, T.C.: Secure handover authentication protocol based on bilinear pairings. Wirel. Pers. Commun. 73(3), 1037–1047 (2013)
Wang, W.J., Hu, L.: A Secure and efficient handover authentication protocol for wireless networks. Sensors 14(7), 11379–11394 (2014)
Cao, X., Kou, W.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2011)
Cao, J., Ma, M., Li, H.: An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Trans. Wirel. Commun. 11(10), 3644–3650 (2012)
Li, G.S., et al.: A new privacy-aware handover authentication scheme for wireless networks. Wirel. Pers. Commun. 80(2), 581–589 (2015)
Chaudhry, S.A., Farash, M.S., Naqvi, H., et al.: A robust and efficient privacy aware handover authentication scheme for wireless networks. Wirel. Pers. Commun. 93(2), 311–335 (2017)
Xie, Y., Wu, L.B., Kumar, N., Shen, J.: Analysis and improvement of a privacy-aware handover authentication scheme for wireless network. Wirel. Pers. Commun. 93(2), 523–541 (2017)
Krawczyk, H.: SIGMA: the ‘SIGn-and-MAc’ approach to authenticated diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400–425. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45146-4_24
Galindo, D., Garcia, F.D.: A schnorr-like lightweight identity-based signature scheme. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 135–148. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02384-2_9
Chatterjee, S., Kamath, C., Kumar, V.: Galindo-Garcia identity-based signature revisited. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 456–471. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37682-5_32
Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161–174 (1991)
Pointcheval, D., Stern, J.: Provably secure blind signature schemes. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 252–265. Springer, Heidelberg (1996). https://doi.org/10.1007/BFb0034852
Acknowledgments
This research is jointly funded by Science and Technology Program of Guangzhou (Grant No. 201707010358), and the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK201707).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wang, C., Jiang, S., Yuan, Y. (2017). Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10656. Springer, Cham. https://doi.org/10.1007/978-3-319-72389-1_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-72389-1_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72388-4
Online ISBN: 978-3-319-72389-1
eBook Packages: Computer ScienceComputer Science (R0)