Skip to main content

Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks

  • Conference paper
  • First Online:
  • 1715 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10656))

Abstract

Many handover authentication protocols for wireless networks have been proposed in recent years. However, most of them are either inefficient or insecure, or lack sufficient concern for user privacy. In this paper, we propose a new design idea for handover authentication protocol by using pseudonym-based cryptography and a variant of the SIGMA (Sign-and-MAC) approach, and present a new handover authentication protocol for wireless networks from elliptic curve cryptography. The proposed protocol satisfies all desirable basic security and privacy requirements, including perfect forward secrecy, user anonymity and un-traceability, conditional privacy preservation and so on. The performance analysis shows that our proposed protocol is more efficient than previous handover authentication protocols in terms of computation and communication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Park, S.H., Ganz, A., Ganz, Z.: Security protocol for IEEE 802.11 wireless local area network. Mob. Netw. Appl. 3(3), 237–246 (1998)

    Article  Google Scholar 

  2. Zekri, D., Defude, B., Delot, T.: Building, sharing and exploiting spatio-temporal aggregates in vehicular networks. Mob. Inf. Syst. 10(3), 259–285 (2014)

    Google Scholar 

  3. Oliveira, L., et al.: Ubiquitous monitoring solution for wireless sensor networks with push notifications and end-to-end connectivity. Mob. Inf. Syst. 10(1), 19–35 (2014)

    Google Scholar 

  4. Mohammad, G., et al.: A survey on wireless body area networks for eHealthcare systems in residential environments. Sensors 16(6), 831 (2016). https://doi.org/10.3390/s16060831

    Article  Google Scholar 

  5. He, D.J., et al.: A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3), 367–374 (2011)

    Article  Google Scholar 

  6. He, D.J., et al.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wirel. Commun. 11(1), 48–53 (2012)

    Article  Google Scholar 

  7. He, D.J., Chen, C., Chan, S., Bu, J.J.: Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Commun. Lett. 16(8), 1270–1273 (2012)

    Article  Google Scholar 

  8. He, D.J., Bu, J.J., Chan, S., Chen, C.: Handauth: efficient handover authentication with conditional privacy for wireless networks. IEEE Trans. Comput. 62(3), 616–622 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  9. Yeo, S.L., et al.: Comments on “analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”. IEEE Commun. Lett. 17(8), 1521–1523 (2013)

    Article  Google Scholar 

  10. Tsai, J.L., Lo, N.W., Wu, T.C.: Secure handover authentication protocol based on bilinear pairings. Wirel. Pers. Commun. 73(3), 1037–1047 (2013)

    Article  Google Scholar 

  11. Wang, W.J., Hu, L.: A Secure and efficient handover authentication protocol for wireless networks. Sensors 14(7), 11379–11394 (2014)

    Article  Google Scholar 

  12. Cao, X., Kou, W.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  13. Cao, J., Ma, M., Li, H.: An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Trans. Wirel. Commun. 11(10), 3644–3650 (2012)

    Article  Google Scholar 

  14. Li, G.S., et al.: A new privacy-aware handover authentication scheme for wireless networks. Wirel. Pers. Commun. 80(2), 581–589 (2015)

    Article  Google Scholar 

  15. Chaudhry, S.A., Farash, M.S., Naqvi, H., et al.: A robust and efficient privacy aware handover authentication scheme for wireless networks. Wirel. Pers. Commun. 93(2), 311–335 (2017)

    Article  Google Scholar 

  16. Xie, Y., Wu, L.B., Kumar, N., Shen, J.: Analysis and improvement of a privacy-aware handover authentication scheme for wireless network. Wirel. Pers. Commun. 93(2), 523–541 (2017)

    Article  Google Scholar 

  17. Krawczyk, H.: SIGMA: the ‘SIGn-and-MAc’ approach to authenticated diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400–425. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45146-4_24

    Chapter  Google Scholar 

  18. Galindo, D., Garcia, F.D.: A schnorr-like lightweight identity-based signature scheme. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 135–148. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02384-2_9

    Chapter  Google Scholar 

  19. Chatterjee, S., Kamath, C., Kumar, V.: Galindo-Garcia identity-based signature revisited. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 456–471. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37682-5_32

    Chapter  Google Scholar 

  20. Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161–174 (1991)

    Article  MATH  Google Scholar 

  21. Pointcheval, D., Stern, J.: Provably secure blind signature schemes. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 252–265. Springer, Heidelberg (1996). https://doi.org/10.1007/BFb0034852

    Google Scholar 

Download references

Acknowledgments

This research is jointly funded by Science and Technology Program of Guangzhou (Grant No. 201707010358), and the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK201707).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changji Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, C., Jiang, S., Yuan, Y. (2017). Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10656. Springer, Cham. https://doi.org/10.1007/978-3-319-72389-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72389-1_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72388-4

  • Online ISBN: 978-3-319-72389-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics