Skip to main content
Log in

Prediction-based secured handover authentication for mobile cloud computing

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Mobile cloud computing (MCC) is a new technology that brings cloud computing and mobile networks together. It enhances the quality of service delivered to mobile clients, network operators, and cloud providers. Security in MCC technology, particularly authentication during the handover process, is a big challenge. Current vertical handover authentication protocols encounter different problems such as undesirable delays in real-time applications, the man in the middle attack, and replay attack. In this paper, a new authentication protocol for heterogeneous IEEE 802.11/LTE-A mobile cloud networks are proposed. The proposed protocol is mainly based on the view of the 3GPP access network discovery and selection function, which uses the capacities given by the IEEE 802.11 and the 3GPP long term evolution-advanced (LTE-A) standards interconnection. A prediction scheme, with no additional load over the network, or the user is utilized to handle cloud computing issues arising during authentication in the handover process. The proposed handover authentication protocol outperformed existing protocols in terms of key confidentiality, powerful security, and efficiency which was used to reduce bandwidth consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Ross, P. (2011). How to keep your head above the clouds: Changing ICT worker skill sets in a cloud computing environment. Employment Relations Record,11(1), 62.

    MathSciNet  Google Scholar 

  2. Umair, S., Muneer, U., Zahoor, M. N., & Malik, A. W. (2015). Mobile computing: Issues and challenges. In 2015 12th international conference on high-capacity optical networks and enabling/emerging technologies (HONET) (pp. 1–5). IEEE.

  3. Umair, S., Muneer, U., Zahoor, M. N., & Malik, A. W. (2016). Mobile cloud computing future trends and opportunities. In Managing and processing big data in cloud computing (p. 105).

  4. Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

  5. Liu, J. K., Au, M. H., Susilo, W., Liang, K., Lu, R., & Srinivasan, B. (2015). Secure sharing and searching for real-time video data in mobile cloud. IEEE Network,29(2), 46–50.

    Google Scholar 

  6. Ma, R., Cao, J., Feng, D., Li, H., Zhang, Y., & Lv, X. (2019). PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks. Ad Hoc Networks,87, 49–60.

    Google Scholar 

  7. Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: Implementation, management, and security. Boca Raton: CRC Press.

    Google Scholar 

  8. GPP (V 15.2.0 Release 15, 2017). TS 23.402, Architecture enhancements for non-3GPP accesses. In 3rd generation partnership project; technical specification group services and system aspects.

  9. Taleb, T., & Kunz, A. (2012). Machine type communications in 3GPP networks: Potential, challenges, and solutions. IEEE Communications Magazine,50(3), 178–1847.

    Google Scholar 

  10. GPP (V 14.1.0, 2017). TS 24.312, access network discovery and selection function (ANDSF) management object (MO). In 3rd generation partnership project; technical specification group services and system aspects.

  11. Yan, X., Şekercioğlu, Y. A., & Narayanan, S. (2010). A survey of vertical handover decision algorithms in Fourth Generation heterogeneous wireless networks. Computer Networks,54(11), 1848–1863.

    MATH  Google Scholar 

  12. Xenakis, D., Passas, N., Di Gregorio, L., & Verikoukis, C. (2011). A context-aware vertical handover framework towards energy-efficiency. In 2011 IEEE 73rd vehicular technology conference (VTC spring) (pp. 1–5). IEEE.

  13. Xenakis, D., Passas, N., Merakos, L., & Verikoukis, C. (2015). Advanced mobility management for reduced interference and energy consumption in the two-tier LTE-advanced network. Computer Networks,76, 90–111.

    Google Scholar 

  14. Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications,20(1), 4–18.

    Google Scholar 

  15. GPP (V 15.0.0 Release 15, 2018). TS 33.401, 3GPP system architecture evolution (SAE); Security architecture. In 3rd generation partnership project; technical specification group services and system aspects.

  16. Abdo, J. B. B., Chaouchi, H., & Aoude, M. (2012). Ensured confidentiality authentication and key agreement protocol for EPS. In 2012 symposium on broadband networks and fast internet (RELABIRA) (pp. 73–77). IEEE.

  17. Fu, J., Bertze, Å., Da Silva, I. L., Kuivinen, F., & Wang, Y. (2016). Handover prediction using historical data. Google Patents.

  18. Xu, X., Xue, Y., Qi, L., Yuan, Y., Zhang, X., Umer, T., et al. (2019). An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Generation Computer Systems,96, 89–100. https://doi.org/10.1016/j.future.2019.01.012.

    Google Scholar 

  19. Chen, Y., Deng, S., Ma, H., Yin, J. J. M. N., & Applications. (2019). Deploying data-intensive applications with multiple services components on edge. Mobile Networks and Applications. https://doi.org/10.1007/s11036-019-01245-3.

    Google Scholar 

  20. Wan, C., Hu, A., & Zhang, J. (2011). An elliptic curve based handoff authentication protocol for WLAN. Chinese Journal of Electronics, 20(1), 165–169.

    Google Scholar 

  21. He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications,34(3), 367–374.

    Google Scholar 

  22. El Bouabidi, I., Daly, I., & Zarai, F. (2012). Secure handoff protocol in 3GPP LTE networks. In 2012 third international conference on communications and networking (ComNet) (pp. 1–6). IEEE.

  23. Choi, J., & Jung, S. (2010). A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters,14(1), 54–56.

    Google Scholar 

  24. Yang, G., Huang, Q., Wong, D. S., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications,9(1), 168–174.

    Google Scholar 

  25. He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications,10(2), 431–436.

    Google Scholar 

  26. Nakanishi, T., & Funabiki, N. (2005). Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps. In International conference on the theory and application of cryptology and information security (pp. 533–548). Springer.

  27. Sharma, M. J., & Leung, V. C. (2011). Improved IP multimedia subsystem authentication mechanism for 3G-WLAN networks. International Journal of Security and Networks,6(2–3), 90–100.

    Google Scholar 

  28. Sharma, M. J., & Leung, V. C. (2012). IP multimedia subsystem authentication protocol in LTE-heterogeneous networks. Human-Centric Computing and Information Sciences,2(1), 16.

    Google Scholar 

  29. He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications,11(1), 48–53.

    Google Scholar 

  30. Cao, J., Ma, M., & Li, H. (2012). An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Transactions on Wireless Communications,11(10), 3644–3650.

    Google Scholar 

  31. Cao, J., Li, H., Ma, M., Zhang, Y., & Lai, C. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks. Computer Networks,56(8), 2119–2131.

    Google Scholar 

  32. Sithirasenan, E., Ramezani, K., Kumar, S., & Muthukkumarasamy, V. (2013). EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability. In Selected topics in WiMAX. InTech.

  33. Liu, J. K., Chu, C. K., Chow, S. S., Huang, X., Au, M. H., & Zhou, J. (2015). Time-bound anonymous authentication for roaming networks. IEEE Transactions on Information Forensics and Security,10(1), 178–189.

    Google Scholar 

  34. He, D., Chan, S., & Guizani, M. (2015). Handover authentication for mobile networks: Security and efficiency aspects. IEEE Network,29(3), 96–103.

    Google Scholar 

  35. Degefa, F. B., Lee, D., Kim, J., Choi, Y., & Won, D. (2016). Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Computer Networks,94, 145–163.

    Google Scholar 

  36. Odelu, V., Zeadally, S., Das, A. K., Wazid, M., & He, D. (2018). A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommunication Systems, 69(4), 431–445.

    Google Scholar 

  37. Jo, H. J., Paik, J. H., & Lee, D. H. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing,13(7), 1469–1481.

    Google Scholar 

  38. Wang, G., Sun, Y., He, Q., Xin, G., & Wang, B. (2018). A content auditing method of IPsec VPN. In 2018 IEEE third international conference on data science in cyberspace (DSC) (pp. 634–639). IEEE.

  39. Yusof, A. L., Ya’acob, N., & Ali, M. T. (2013). Hysteresis margin for handover in long term evolution (LTE) network. In 2013 international conference on computing, management and telecommunications (ComManTel) (pp. 426–430). IEEE.

  40. Khan, M., & Han, K. (2014). An optimized network selection and handover triggering scheme for heterogeneous self-organized wireless networks. Mathematical Problems in Engineering, 2014.

  41. Luo, Y., Tran, P. N., An, C., Eymann, J., Kreft, L., & Timm-Giel, A. (2013). A novel handover prediction scheme in content centric networking using nonlinear autoregressive exogenous model. In 2013 IEEE 77th vehicular technology conference (VTC spring) (pp. 1–5). IEEE.

  42. Bae, S. J., Chung, M. Y., & So, J. (2011). Handover triggering mechanism based on IEEE 802.21 in heterogeneous networks with LTE and WLAN. In 2011 international conference on information networking (ICOIN) (pp. 399–403). IEEE.

  43. Sgora, A., & Vergados, D. D. (2009). Handoff prioritization and decision schemes in wireless cellular networks: A survey. IEEE Communications Surveys & Tutorials,11(4), 57–77.

    Google Scholar 

  44. Mattos, D. M. F., & Duarte, O. C. M. B. (2016). AuthFlow: Authentication and access control mechanism for software defined networking. Annals of Telecommunications,71(11–12), 607–615.

    Google Scholar 

  45. Gulati, S., Sharma, S., & Agarwal, G. (2018). The hidden truth anonymity in cyberspace: Deep web. In Intelligent computing and information and communication (pp. 719–730). Springer.

  46. Xu, G., Qiu, S., Ahmad, H., Xu, G., Guo, Y., Zhang, M., et al. (2018). A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors,18(7), 2394.

    Google Scholar 

  47. Fu, A., Qin, N., Wang, Y., Li, Q., & Zhang, G. J. W. N. (2017). Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks. Wireless Networks,23(7), 2165–2176. https://doi.org/10.1007/s11276-016-1277-0.

    Google Scholar 

  48. El Idrissi, Y. E. H., Zahid, N., & Jedra, M. (2012). Security analysis of 3GPP (LTE)—WLAN interworking and a new local authentication method based on EAP-AKA. In 2012 international conference on future generation communication technology (FGCT) (pp. 137–142). IEEE.

  49. Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE Communications Surveys & Tutorials,18(3), 2027–2051.

    Google Scholar 

  50. Mo, Y., & Sinopoli, B. (2009). Secure control against replay attacks. In 47th annual Allerton conference on communication, control, and computing, 2009. Allerton 2009 (pp. 911–918). IEEE.

  51. Na, S., Hwang, D. Y., Shin, W., & Kim, K.-H. (2017). Scenario and countermeasure for replay attack using join request messages in LoRaWAN. In 2017 international conference on information networking (ICOIN) (pp. 718–720). IEEE.

  52. Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Computer security: Principles and practice: Pearson Education, ISBN 0273764497.

  53. Zhu, Y., Huang, Z., & Takagi, T. (2016). Secure and controllable k-NN query over encrypted cloud data with key confidentiality. Journal of Parallel and Distributed Computing,89, 1–12.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khalid M. Hosny.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khedr, W.I., Hosny, K.M., Khashaba, M.M. et al. Prediction-based secured handover authentication for mobile cloud computing. Wireless Netw 26, 4657–4675 (2020). https://doi.org/10.1007/s11276-020-02368-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-020-02368-2

Keywords

Navigation