Skip to main content
Log in

A New Privacy-Aware Handover Authentication Scheme for Wireless Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A fast handover authentication scheme is essential to seamless services for delay-sensitive applications in wireless networks. User privacy is a notable issue which should be considered in secure communications. This paper proposes a new privacy-aware handover authentication scheme. The proposed scheme achieves user privacy with good performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communication, 11(1), 48–53.

    Article  Google Scholar 

  2. Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011). A privacy preserving handover authentication schemes for EAP-based wireless networks. Proceedings of IEEE GLOBECOM, 2011, 1–6.

    Google Scholar 

  3. He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.

    Article  Google Scholar 

  4. Yeo, S. L., Yap, W., Liu, J. K., & Henricksen, M. (2013). Comments on “Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”. IEEE Communications Letters, 17(8), 1521–1523.

    Article  Google Scholar 

  5. Tsai, J., Lo, N., & Wu, T. (2013). Secure handover authentication protocol based on bilinear pairings. Wireless Personal Communications, 73(3), 1037–1047.

    Article  Google Scholar 

  6. Cao, J., Ma, M., & Li, H. (2012). An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Transactions on Wireless Communication, 11(10), 3644–3650.

    Article  Google Scholar 

  7. He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communication, 10(2), 431–436.

    Article  Google Scholar 

  8. He, D., Bu, J., Chan, S., & Chen, C. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks. IEEE Transactions on Computers, 62(3), 616–622.

    Article  MathSciNet  Google Scholar 

  9. Galindo, D., & Garcia, F. D. (2009). A Schnorr-like lightweight identity-based signature scheme. Proceedings of AFRICACRYPT, 09, 135–148.

    Google Scholar 

  10. LaMacchia, B., Lauter, K., & Mityagin, A. (2007). Stronger security of authenticated key exchange. Proceedings of ProvSec, 4784, 1–16.

    Google Scholar 

  11. Ustaoglu, B. (2008). Obtaining a secure and efficient key agreement protocol for (H)MQV and NAXOS. Designs, Codes and Cryptography, 46(3), 329–342.

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the anonymous reviewers and the editor for their comments that will help them to improve this paper. This work is supported by the National Natural Science Foundation of China (61201220, 61202389, 61309016, 61379150), and the Fundamental Research Funds for the Central Universities (Program No. JB140302).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangsong Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, G., Jiang, Q., Wei, F. et al. A New Privacy-Aware Handover Authentication Scheme for Wireless Networks. Wireless Pers Commun 80, 581–589 (2015). https://doi.org/10.1007/s11277-014-2029-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-2029-z

Keywords

Navigation