Skip to main content

A Secure Anonymous Mobile Handover Authentication Protocol for Content Centric Network

  • Conference paper
  • First Online:
Computational Intelligence, Communications, and Business Analytics (CICBA 2018)

Abstract

In current technological era, content centric network (CCN) is envisaged as a clean-slate future Internet architecture to meet the growing demand of information exchange as well as to ease smooth distribution of content. Recently, with the popularity of mobile devices, wireless mobile network (WMN) has become an integral part of our daily life. Through WMN mobile users can access information/content from Internet anytime even in roaming from one cellular network to another. However, due to limitation of coverage of an access point (AP) in WMN, mobile handover occurs frequently between the AP and mobile device. During handover process, privacy and security of a mobile consumer becomes a serious challenge since mobile user’s anonymity and non-traceability have to be maintained. However, mobility of consumer and content producer in CCN is a major concern which needs to be addressed along with its security aspect. In this paper, a lightweight anonymous handover authentication protocol for mobile users in CCN is proposed. The proposed scheme is designed to provide secure and seamless roaming service to mobile users. To overcome the limitations of resource constrained mobile devices, identity based cryptography (IBC) is used to design an anonymous mobile handover authentication and session key negotiation protocol in CCN. The security analysis of the proposed protocol is done to show its resilience against relevant cryptographic attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pp. 1–12. ACM (2009)

    Google Scholar 

  2. Mahadevan, P.: CCNx 1.0 Tutorial. PARC, Technical report (2014)

    Google Scholar 

  3. Kurihara, J., Uzun, E., Wood, C. A.: An encryption-based access control framework for content-centric networking. In: IFIP Networking Conference (IFIP Networking), pp. 1–9 (2015)

    Google Scholar 

  4. Ghodsi, A., Koponen, T., Rajahalme, J., Sarolahti, P., Shenker, S.: Naming in content-oriented architectures. In: Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, pp. 1–6 (2011)

    Google Scholar 

  5. Zhang, G., Li, Y., Lin, T.: Caching in information centric networking: a survey. Comput. Netw. 57(16), 3128–3141 (2013)

    Article  Google Scholar 

  6. Bari, M.F., Chowdhury, S., Ahmed, R.: A survey of naming and routing in information-centric networks. IEEE Commun. Mag. 50(12), 44–53 (2012)

    Article  Google Scholar 

  7. Zhang, X., Chang, K., Xiong, H.: Towards name-based trust and security for content-centric network. In: Proceedings of 19th IEEE International Conference on Network Protocols (ICNP), pp. 1–6 (2011)

    Google Scholar 

  8. Sun, H.M., Chang, S.Y., Lin, Y.H., Chiou, S.Y.: Efficient authentication schemes for handover in mobile WiMAX. In: Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, vol. 3, pp. 235–240 (2008)

    Google Scholar 

  9. Yang, X., Huang, X., Liu, J.K.: Efficient handover authentication with user anonymity and untraceability for mobile cloud computing. Futur. Gener. Comput. Syst. 62, 190–195 (2016)

    Article  Google Scholar 

  10. Cao, J., Ma, M., Li, H.: An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Trans. Wirel. Commun. 11(10), 3644–3650 (2012)

    Article  Google Scholar 

  11. He, D., Chen, C., Chan, S., Bu, J.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wirel. Commun. 11(1), 48–53 (2012)

    Article  Google Scholar 

  12. He, D., Chen, C., Chan, S., Bu, J.: Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Commun. Lett. 16(8), 1270–1273 (2012)

    Article  Google Scholar 

  13. Tsai, J.L., Lo, N.W., Wu, T.C.: Secure handover authentication protocol based on bilinear pairings. Wirel. Pers. Commun. 73(3), 1037–1047 (2013)

    Article  Google Scholar 

  14. Chaudhry, S.A., Farash, M.S., Naqvi, H., Islam, S.H., Shon, T.: A robust and efficient privacy aware handover authentication scheme for wireless networks. Wirel. Pers. Commun. 93(2), 311–335 (2017)

    Article  Google Scholar 

  15. Lee, J., Cho, S., Kim, D.: Device mobility management in content-centric networking. IEEE Commun. Mag. 50(12), 28–34 (2012)

    Article  Google Scholar 

  16. Liao, Y.P., Hsiao, C.M.: A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients. Future Gener. Comput. Syst. 29(3), 886–900 (2013)

    Article  Google Scholar 

  17. Hsieh, W.B., Leu, J.S.: An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures. J. Supercomput. 70(1), 133–148 (2014)

    Article  Google Scholar 

  18. Wang, W., Hu, L.: A secure and efficient handover authentication protocol for wireless networks. Sensors 14(7), 11379–11394 (2014)

    Article  Google Scholar 

  19. He, D., Khan, M.K., Kumar, N.: A new handover authentication protocol based on bilinear pairing functions for wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 18(1–2), 67–74 (2015)

    Article  Google Scholar 

  20. Li, G., Jiang, Q., Wei, F., Ma, C.: A new privacy-aware handover authentication scheme for wireless networks. Wirel. Pers. Commun. 80(2), 581–589 (2015)

    Article  Google Scholar 

  21. Xie, Y., Wu, L., Kumar, N., Shen, J.: Analysis and improvement of a privacy-aware handover authentication scheme for wireless network. Wirel. Pers. Commun. 93(2), 523–541 (2017)

    Article  Google Scholar 

  22. Zeng, Y., Guang, H., Li, G.: Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks. Security and Communication Networks (2018)

    Google Scholar 

  23. Joye, M., Neven, G. (eds.): Identity-Based Cryptography, vol. 2. IOS Press, Amsterdam (2009)

    MATH  Google Scholar 

  24. Smart, N.P.: Identity-based authenticated key agreement protocol based on weil pairing. Electron. Lett. 38(13), 630–632 (2002)

    Article  Google Scholar 

  25. Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2006). https://doi.org/10.1007/b97644

    Book  MATH  Google Scholar 

  26. Lauter, K.: The advantages of elliptic curve cryptography for wireless security. IEEE Wirel. Commun. 11(1), 62–67 (2004)

    Article  MathSciNet  Google Scholar 

  27. He, D., Zeadally, S., Kumar, N., Wu, W.: Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans. Inf. Forensics Secur. 11(9), 2052–2064 (2016)

    Article  Google Scholar 

Download references

Acknowledgement

This research work is financially supported by Visvesvaraya PhD Scheme, Ministry of Electronics and Information Technology, Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sharmistha Adhikari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Adhikari, S., Ray, S. (2019). A Secure Anonymous Mobile Handover Authentication Protocol for Content Centric Network. In: Mandal, J., Mukhopadhyay, S., Dutta, P., Dasgupta, K. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2018. Communications in Computer and Information Science, vol 1031. Springer, Singapore. https://doi.org/10.1007/978-981-13-8581-0_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-8581-0_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-8580-3

  • Online ISBN: 978-981-13-8581-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics