Abstract
Mobile cloud computing (MCC) is a new technology that brings cloud computing and mobile networks together. It enhances the quality of service delivered to mobile clients, network operators, and cloud providers. Security in MCC technology, particularly authentication during the handover process, is a big challenge. Current vertical handover authentication protocols encounter different problems such as undesirable delays in real-time applications, the man in the middle attack, and replay attack. In this paper, a new authentication protocol for heterogeneous IEEE 802.11/LTE-A mobile cloud networks are proposed. The proposed protocol is mainly based on the view of the 3GPP access network discovery and selection function, which uses the capacities given by the IEEE 802.11 and the 3GPP long term evolution-advanced (LTE-A) standards interconnection. A prediction scheme, with no additional load over the network, or the user is utilized to handle cloud computing issues arising during authentication in the handover process. The proposed handover authentication protocol outperformed existing protocols in terms of key confidentiality, powerful security, and efficiency which was used to reduce bandwidth consumption.
Similar content being viewed by others
References
Ross, P. (2011). How to keep your head above the clouds: Changing ICT worker skill sets in a cloud computing environment. Employment Relations Record,11(1), 62.
Umair, S., Muneer, U., Zahoor, M. N., & Malik, A. W. (2015). Mobile computing: Issues and challenges. In 2015 12th international conference on high-capacity optical networks and enabling/emerging technologies (HONET) (pp. 1–5). IEEE.
Umair, S., Muneer, U., Zahoor, M. N., & Malik, A. W. (2016). Mobile cloud computing future trends and opportunities. In Managing and processing big data in cloud computing (p. 105).
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Liu, J. K., Au, M. H., Susilo, W., Liang, K., Lu, R., & Srinivasan, B. (2015). Secure sharing and searching for real-time video data in mobile cloud. IEEE Network,29(2), 46–50.
Ma, R., Cao, J., Feng, D., Li, H., Zhang, Y., & Lv, X. (2019). PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks. Ad Hoc Networks,87, 49–60.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: Implementation, management, and security. Boca Raton: CRC Press.
GPP (V 15.2.0 Release 15, 2017). TS 23.402, Architecture enhancements for non-3GPP accesses. In 3rd generation partnership project; technical specification group services and system aspects.
Taleb, T., & Kunz, A. (2012). Machine type communications in 3GPP networks: Potential, challenges, and solutions. IEEE Communications Magazine,50(3), 178–1847.
GPP (V 14.1.0, 2017). TS 24.312, access network discovery and selection function (ANDSF) management object (MO). In 3rd generation partnership project; technical specification group services and system aspects.
Yan, X., Şekercioğlu, Y. A., & Narayanan, S. (2010). A survey of vertical handover decision algorithms in Fourth Generation heterogeneous wireless networks. Computer Networks,54(11), 1848–1863.
Xenakis, D., Passas, N., Di Gregorio, L., & Verikoukis, C. (2011). A context-aware vertical handover framework towards energy-efficiency. In 2011 IEEE 73rd vehicular technology conference (VTC spring) (pp. 1–5). IEEE.
Xenakis, D., Passas, N., Merakos, L., & Verikoukis, C. (2015). Advanced mobility management for reduced interference and energy consumption in the two-tier LTE-advanced network. Computer Networks,76, 90–111.
Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications,20(1), 4–18.
GPP (V 15.0.0 Release 15, 2018). TS 33.401, 3GPP system architecture evolution (SAE); Security architecture. In 3rd generation partnership project; technical specification group services and system aspects.
Abdo, J. B. B., Chaouchi, H., & Aoude, M. (2012). Ensured confidentiality authentication and key agreement protocol for EPS. In 2012 symposium on broadband networks and fast internet (RELABIRA) (pp. 73–77). IEEE.
Fu, J., Bertze, Å., Da Silva, I. L., Kuivinen, F., & Wang, Y. (2016). Handover prediction using historical data. Google Patents.
Xu, X., Xue, Y., Qi, L., Yuan, Y., Zhang, X., Umer, T., et al. (2019). An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Generation Computer Systems,96, 89–100. https://doi.org/10.1016/j.future.2019.01.012.
Chen, Y., Deng, S., Ma, H., Yin, J. J. M. N., & Applications. (2019). Deploying data-intensive applications with multiple services components on edge. Mobile Networks and Applications. https://doi.org/10.1007/s11036-019-01245-3.
Wan, C., Hu, A., & Zhang, J. (2011). An elliptic curve based handoff authentication protocol for WLAN. Chinese Journal of Electronics, 20(1), 165–169.
He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications,34(3), 367–374.
El Bouabidi, I., Daly, I., & Zarai, F. (2012). Secure handoff protocol in 3GPP LTE networks. In 2012 third international conference on communications and networking (ComNet) (pp. 1–6). IEEE.
Choi, J., & Jung, S. (2010). A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters,14(1), 54–56.
Yang, G., Huang, Q., Wong, D. S., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications,9(1), 168–174.
He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications,10(2), 431–436.
Nakanishi, T., & Funabiki, N. (2005). Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps. In International conference on the theory and application of cryptology and information security (pp. 533–548). Springer.
Sharma, M. J., & Leung, V. C. (2011). Improved IP multimedia subsystem authentication mechanism for 3G-WLAN networks. International Journal of Security and Networks,6(2–3), 90–100.
Sharma, M. J., & Leung, V. C. (2012). IP multimedia subsystem authentication protocol in LTE-heterogeneous networks. Human-Centric Computing and Information Sciences,2(1), 16.
He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications,11(1), 48–53.
Cao, J., Ma, M., & Li, H. (2012). An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Transactions on Wireless Communications,11(10), 3644–3650.
Cao, J., Li, H., Ma, M., Zhang, Y., & Lai, C. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks. Computer Networks,56(8), 2119–2131.
Sithirasenan, E., Ramezani, K., Kumar, S., & Muthukkumarasamy, V. (2013). EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability. In Selected topics in WiMAX. InTech.
Liu, J. K., Chu, C. K., Chow, S. S., Huang, X., Au, M. H., & Zhou, J. (2015). Time-bound anonymous authentication for roaming networks. IEEE Transactions on Information Forensics and Security,10(1), 178–189.
He, D., Chan, S., & Guizani, M. (2015). Handover authentication for mobile networks: Security and efficiency aspects. IEEE Network,29(3), 96–103.
Degefa, F. B., Lee, D., Kim, J., Choi, Y., & Won, D. (2016). Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Computer Networks,94, 145–163.
Odelu, V., Zeadally, S., Das, A. K., Wazid, M., & He, D. (2018). A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommunication Systems, 69(4), 431–445.
Jo, H. J., Paik, J. H., & Lee, D. H. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing,13(7), 1469–1481.
Wang, G., Sun, Y., He, Q., Xin, G., & Wang, B. (2018). A content auditing method of IPsec VPN. In 2018 IEEE third international conference on data science in cyberspace (DSC) (pp. 634–639). IEEE.
Yusof, A. L., Ya’acob, N., & Ali, M. T. (2013). Hysteresis margin for handover in long term evolution (LTE) network. In 2013 international conference on computing, management and telecommunications (ComManTel) (pp. 426–430). IEEE.
Khan, M., & Han, K. (2014). An optimized network selection and handover triggering scheme for heterogeneous self-organized wireless networks. Mathematical Problems in Engineering, 2014.
Luo, Y., Tran, P. N., An, C., Eymann, J., Kreft, L., & Timm-Giel, A. (2013). A novel handover prediction scheme in content centric networking using nonlinear autoregressive exogenous model. In 2013 IEEE 77th vehicular technology conference (VTC spring) (pp. 1–5). IEEE.
Bae, S. J., Chung, M. Y., & So, J. (2011). Handover triggering mechanism based on IEEE 802.21 in heterogeneous networks with LTE and WLAN. In 2011 international conference on information networking (ICOIN) (pp. 399–403). IEEE.
Sgora, A., & Vergados, D. D. (2009). Handoff prioritization and decision schemes in wireless cellular networks: A survey. IEEE Communications Surveys & Tutorials,11(4), 57–77.
Mattos, D. M. F., & Duarte, O. C. M. B. (2016). AuthFlow: Authentication and access control mechanism for software defined networking. Annals of Telecommunications,71(11–12), 607–615.
Gulati, S., Sharma, S., & Agarwal, G. (2018). The hidden truth anonymity in cyberspace: Deep web. In Intelligent computing and information and communication (pp. 719–730). Springer.
Xu, G., Qiu, S., Ahmad, H., Xu, G., Guo, Y., Zhang, M., et al. (2018). A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors,18(7), 2394.
Fu, A., Qin, N., Wang, Y., Li, Q., & Zhang, G. J. W. N. (2017). Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks. Wireless Networks,23(7), 2165–2176. https://doi.org/10.1007/s11276-016-1277-0.
El Idrissi, Y. E. H., Zahid, N., & Jedra, M. (2012). Security analysis of 3GPP (LTE)—WLAN interworking and a new local authentication method based on EAP-AKA. In 2012 international conference on future generation communication technology (FGCT) (pp. 137–142). IEEE.
Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE Communications Surveys & Tutorials,18(3), 2027–2051.
Mo, Y., & Sinopoli, B. (2009). Secure control against replay attacks. In 47th annual Allerton conference on communication, control, and computing, 2009. Allerton 2009 (pp. 911–918). IEEE.
Na, S., Hwang, D. Y., Shin, W., & Kim, K.-H. (2017). Scenario and countermeasure for replay attack using join request messages in LoRaWAN. In 2017 international conference on information networking (ICOIN) (pp. 718–720). IEEE.
Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Computer security: Principles and practice: Pearson Education, ISBN 0273764497.
Zhu, Y., Huang, Z., & Takagi, T. (2016). Secure and controllable k-NN query over encrypted cloud data with key confidentiality. Journal of Parallel and Distributed Computing,89, 1–12.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khedr, W.I., Hosny, K.M., Khashaba, M.M. et al. Prediction-based secured handover authentication for mobile cloud computing. Wireless Netw 26, 4657–4675 (2020). https://doi.org/10.1007/s11276-020-02368-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-020-02368-2