Abstract
In current technological era, content centric network (CCN) is envisaged as a clean-slate future Internet architecture to meet the growing demand of information exchange as well as to ease smooth distribution of content. Recently, with the popularity of mobile devices, wireless mobile network (WMN) has become an integral part of our daily life. Through WMN mobile users can access information/content from Internet anytime even in roaming from one cellular network to another. However, due to limitation of coverage of an access point (AP) in WMN, mobile handover occurs frequently between the AP and mobile device. During handover process, privacy and security of a mobile consumer becomes a serious challenge since mobile user’s anonymity and non-traceability have to be maintained. However, mobility of consumer and content producer in CCN is a major concern which needs to be addressed along with its security aspect. In this paper, a lightweight anonymous handover authentication protocol for mobile users in CCN is proposed. The proposed scheme is designed to provide secure and seamless roaming service to mobile users. To overcome the limitations of resource constrained mobile devices, identity based cryptography (IBC) is used to design an anonymous mobile handover authentication and session key negotiation protocol in CCN. The security analysis of the proposed protocol is done to show its resilience against relevant cryptographic attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pp. 1–12. ACM (2009)
Mahadevan, P.: CCNx 1.0 Tutorial. PARC, Technical report (2014)
Kurihara, J., Uzun, E., Wood, C. A.: An encryption-based access control framework for content-centric networking. In: IFIP Networking Conference (IFIP Networking), pp. 1–9 (2015)
Ghodsi, A., Koponen, T., Rajahalme, J., Sarolahti, P., Shenker, S.: Naming in content-oriented architectures. In: Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, pp. 1–6 (2011)
Zhang, G., Li, Y., Lin, T.: Caching in information centric networking: a survey. Comput. Netw. 57(16), 3128–3141 (2013)
Bari, M.F., Chowdhury, S., Ahmed, R.: A survey of naming and routing in information-centric networks. IEEE Commun. Mag. 50(12), 44–53 (2012)
Zhang, X., Chang, K., Xiong, H.: Towards name-based trust and security for content-centric network. In: Proceedings of 19th IEEE International Conference on Network Protocols (ICNP), pp. 1–6 (2011)
Sun, H.M., Chang, S.Y., Lin, Y.H., Chiou, S.Y.: Efficient authentication schemes for handover in mobile WiMAX. In: Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, vol. 3, pp. 235–240 (2008)
Yang, X., Huang, X., Liu, J.K.: Efficient handover authentication with user anonymity and untraceability for mobile cloud computing. Futur. Gener. Comput. Syst. 62, 190–195 (2016)
Cao, J., Ma, M., Li, H.: An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Trans. Wirel. Commun. 11(10), 3644–3650 (2012)
He, D., Chen, C., Chan, S., Bu, J.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wirel. Commun. 11(1), 48–53 (2012)
He, D., Chen, C., Chan, S., Bu, J.: Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Commun. Lett. 16(8), 1270–1273 (2012)
Tsai, J.L., Lo, N.W., Wu, T.C.: Secure handover authentication protocol based on bilinear pairings. Wirel. Pers. Commun. 73(3), 1037–1047 (2013)
Chaudhry, S.A., Farash, M.S., Naqvi, H., Islam, S.H., Shon, T.: A robust and efficient privacy aware handover authentication scheme for wireless networks. Wirel. Pers. Commun. 93(2), 311–335 (2017)
Lee, J., Cho, S., Kim, D.: Device mobility management in content-centric networking. IEEE Commun. Mag. 50(12), 28–34 (2012)
Liao, Y.P., Hsiao, C.M.: A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients. Future Gener. Comput. Syst. 29(3), 886–900 (2013)
Hsieh, W.B., Leu, J.S.: An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures. J. Supercomput. 70(1), 133–148 (2014)
Wang, W., Hu, L.: A secure and efficient handover authentication protocol for wireless networks. Sensors 14(7), 11379–11394 (2014)
He, D., Khan, M.K., Kumar, N.: A new handover authentication protocol based on bilinear pairing functions for wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 18(1–2), 67–74 (2015)
Li, G., Jiang, Q., Wei, F., Ma, C.: A new privacy-aware handover authentication scheme for wireless networks. Wirel. Pers. Commun. 80(2), 581–589 (2015)
Xie, Y., Wu, L., Kumar, N., Shen, J.: Analysis and improvement of a privacy-aware handover authentication scheme for wireless network. Wirel. Pers. Commun. 93(2), 523–541 (2017)
Zeng, Y., Guang, H., Li, G.: Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks. Security and Communication Networks (2018)
Joye, M., Neven, G. (eds.): Identity-Based Cryptography, vol. 2. IOS Press, Amsterdam (2009)
Smart, N.P.: Identity-based authenticated key agreement protocol based on weil pairing. Electron. Lett. 38(13), 630–632 (2002)
Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2006). https://doi.org/10.1007/b97644
Lauter, K.: The advantages of elliptic curve cryptography for wireless security. IEEE Wirel. Commun. 11(1), 62–67 (2004)
He, D., Zeadally, S., Kumar, N., Wu, W.: Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans. Inf. Forensics Secur. 11(9), 2052–2064 (2016)
Acknowledgement
This research work is financially supported by Visvesvaraya PhD Scheme, Ministry of Electronics and Information Technology, Government of India.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Adhikari, S., Ray, S. (2019). A Secure Anonymous Mobile Handover Authentication Protocol for Content Centric Network. In: Mandal, J., Mukhopadhyay, S., Dutta, P., Dasgupta, K. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2018. Communications in Computer and Information Science, vol 1031. Springer, Singapore. https://doi.org/10.1007/978-981-13-8581-0_29
Download citation
DOI: https://doi.org/10.1007/978-981-13-8581-0_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8580-3
Online ISBN: 978-981-13-8581-0
eBook Packages: Computer ScienceComputer Science (R0)