Abstract
A fast handover authentication scheme is essential to seamless services for delay-sensitive applications in wireless networks. User privacy is a notable issue which should be considered in secure communications. This paper proposes a new privacy-aware handover authentication scheme. The proposed scheme achieves user privacy with good performance.
Similar content being viewed by others
References
He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communication, 11(1), 48–53.
Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011). A privacy preserving handover authentication schemes for EAP-based wireless networks. Proceedings of IEEE GLOBECOM, 2011, 1–6.
He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.
Yeo, S. L., Yap, W., Liu, J. K., & Henricksen, M. (2013). Comments on “Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”. IEEE Communications Letters, 17(8), 1521–1523.
Tsai, J., Lo, N., & Wu, T. (2013). Secure handover authentication protocol based on bilinear pairings. Wireless Personal Communications, 73(3), 1037–1047.
Cao, J., Ma, M., & Li, H. (2012). An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Transactions on Wireless Communication, 11(10), 3644–3650.
He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communication, 10(2), 431–436.
He, D., Bu, J., Chan, S., & Chen, C. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks. IEEE Transactions on Computers, 62(3), 616–622.
Galindo, D., & Garcia, F. D. (2009). A Schnorr-like lightweight identity-based signature scheme. Proceedings of AFRICACRYPT, 09, 135–148.
LaMacchia, B., Lauter, K., & Mityagin, A. (2007). Stronger security of authenticated key exchange. Proceedings of ProvSec, 4784, 1–16.
Ustaoglu, B. (2008). Obtaining a secure and efficient key agreement protocol for (H)MQV and NAXOS. Designs, Codes and Cryptography, 46(3), 329–342.
Acknowledgments
The authors would like to thank the anonymous reviewers and the editor for their comments that will help them to improve this paper. This work is supported by the National Natural Science Foundation of China (61201220, 61202389, 61309016, 61379150), and the Fundamental Research Funds for the Central Universities (Program No. JB140302).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, G., Jiang, Q., Wei, F. et al. A New Privacy-Aware Handover Authentication Scheme for Wireless Networks. Wireless Pers Commun 80, 581–589 (2015). https://doi.org/10.1007/s11277-014-2029-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-014-2029-z