Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks

A handover authentication protocol in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. Many such protocols have been proposed but shown to be either insecure or inefficient. Very recently, a novel handover authentication protocol named PairHand was proposed, which has been shown to outperform all other protocols in terms of security and efficiency. However, we identify an inherent design weakness in the handover authentication phase of PairHand, and demonstrate that under certain circumstances it is vulnerable to a session key compromised problem. Further, we propose a simple modification to fix the identified security problem without losing any features (such as high efficiency and robust security) of PairHand. Experiments using our implementation on Laptop PCs show that the suggested modification is applicable in real world applications.

[1]  Chun Chen,et al.  A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..

[2]  Xiaotie Deng,et al.  Universal authentication protocols for anonymous wireless communications , 2010, IEEE Transactions on Wireless Communications.

[3]  Shuenn-Shyang Wang,et al.  A secure dynamic ID based remote user authentication scheme for multi-server environment , 2009, Comput. Stand. Interfaces.

[4]  Chun Chen,et al.  Secure and efficient dynamic program update in wireless sensor networks , 2012, Secur. Commun. Networks.

[5]  Hung-Min Sun,et al.  On the Security of Chien's Ultralightweight RFID Authentication Protocol , 2011, IEEE Transactions on Dependable and Secure Computing.

[6]  Souhwan Jung,et al.  A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.

[7]  Chin-Chen Chang,et al.  Enhanced authentication scheme with anonymity for roaming service in global mobility networks , 2009, Comput. Commun..

[8]  Wei Ren,et al.  SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography , 2007, 2007 IEEE International Conference on Communications.

[9]  Chun Chen,et al.  Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.

[10]  Souhwan Jung,et al.  A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6 , 2008, IEICE Trans. Commun..

[11]  Wei-Kuan Shih,et al.  Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment , 2009, Comput. Stand. Interfaces.

[12]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[13]  Guomin Yang Comments on "An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks" , 2011, IEEE Trans. Wirel. Commun..

[14]  Myungsik Yoo,et al.  A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks , 2009, NEW2AN.

[15]  Chin-Chen Chang,et al.  An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[16]  Chun Chen,et al.  Privacy-Preserving Universal Authentication Protocol for Wireless Communications , 2011, IEEE Transactions on Wireless Communications.