A Lightweight Handover Authentication Protocol based on Proxy Signature for Wireless Networks

The authentication and key agreement (AKA) protocols plays an improtant role to validate the communication entities in the wireless network. The applications of the wireless networks are secure only after the successful authentication of the communication entities during the handover. To obtain the secrecy in these applications, various handover protocols have been proposed. Unfortunately, most of the existing handover protocols suffer from key escrow problem and can't achieve the key forward/backward secrecy. Moreover, these protocols incur various identified attacks and high bandwidth consumption during the handover process. Hence, these protocols are not suitable for secure authentication in wireless networks. However, the proxy signature based handover protocols are also proposed by the researchers but, these protocols fail to accomplish all the security properties. To overcome the above problems, we propose the proxy signature based lightweight handover authentication protocol for wireless network. The proposed protocol fulfills all the security demands and avoids the identified attacks. The security analysis of the protocol proves the security against the malicious attacks. Finally, the performance analysis shows that the protocol obtains the improved results in terms of the communication and computation overhead compared to existing protocols.

[1]  Anmin Fu,et al.  A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[2]  Hao Chen,et al.  CapAuth: A Capability-based Handover Scheme , 2010, 2010 Proceedings IEEE INFOCOM.

[3]  Jin Li,et al.  Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.

[4]  Jin Cao,et al.  An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks , 2012, IEEE Transactions on Wireless Communications.

[5]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[6]  Yanghee Choi,et al.  Fast handoff scheme based on mobility prediction in public wireless LAN systems , 2004 .

[7]  Souhwan Jung,et al.  A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.

[8]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[9]  Wei Ren,et al.  SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography , 2007, 2007 IEEE International Conference on Communications.

[10]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[11]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[12]  Maode Ma,et al.  A proxy signature-based handover authentication scheme for LTE wireless networks , 2017, J. Netw. Comput. Appl..

[13]  Debiao He,et al.  A new handover authentication protocol based on bilinear pairing functions for wireless networks , 2015, Int. J. Ad Hoc Ubiquitous Comput..

[14]  Jin Yang,et al.  Evolved Universal Terrestrial Radio Access Network (EUTRAN) , 2017 .

[15]  Souhwan Jung,et al.  A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6 , 2008, IEICE Trans. Commun..