Identity-based construction for secure and efficient handoff authentication schemes in wireless networks

With the rapid development of computer networks, wireless technologies find important applications in roaming communication. In this scenario, practical needs initiate the demand for a secure and efficient handoff authentication scheme. To the best of our knowledge, however, there exists no scheme that can simultaneously provide robust security properties and enjoy desirable efficiency. In this paper, we first examines the security of the scheme proposed in International Conference on Communications 2007 by Kim et al. and demonstrates that the scheme of Kim et al. fails to achieve perfect forward/backward secrecy. Furthermore, we propose a new identity-based construction for secure and efficient handoff authentication schemes, in which an identity-based online/offline encryption scheme is the primary ingredient. Compared with the scheme of Kim et al., our construction enjoys desirable efficiency in terms of the computation cost and the communication cost. To be specific, the developed scheme not only realizes a seamless handoff with key agreement, but also provides perfect forward/backward secrecy, which has never been achieved in any existing handoff-related schemes. Therefore, our construction is more suitable for handoff authentication in the wireless applications environment. Copyright © 2012 John Wiley & Sons, Ltd.

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[3]  Steven D. Galbraith,et al.  Implementing the Tate Pairing , 2002, ANTS.

[4]  Yanghee Choi,et al.  Fast handoff scheme based on mobility prediction in public wireless LAN systems , 2004 .

[5]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[6]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.

[7]  Souhwan Jung,et al.  A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.

[8]  Yael Tauman Kalai,et al.  Improved Online/Offline Signature Schemes , 2001, CRYPTO.

[9]  Fuchun Guo,et al.  Identity-Based Online/Offline Encryption , 2008, Financial Cryptography.

[10]  William A. Arbaugh,et al.  Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.

[11]  Wei Ren,et al.  SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography , 2007, 2007 IEEE International Conference on Communications.

[12]  Yi Mu,et al.  Efficient generic on-line/off-line (threshold) signatures without key exposure , 2008, Inf. Sci..

[13]  Silvio Micali,et al.  On-line/off-line digital signatures , 1996, Journal of Cryptology.

[14]  C. Pandu Rangan,et al.  Identity Based Online/Offline Encryption Scheme , 2010, IACR Cryptol. ePrint Arch..

[15]  Shyhtsun Felix Wu,et al.  A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network , 2005, WISA.

[16]  Yi Mu,et al.  Efficient Generic On-Line/Off-Line Signatures Without Key Exposure , 2007, ACNS.

[17]  Souhwan Jung,et al.  A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6 , 2008, IEICE Trans. Commun..

[18]  Hugo Krawczyk,et al.  Chameleon Signatures , 2000, NDSS.

[19]  Eun-Jun Yoon,et al.  Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing , 2010, IEICE Trans. Inf. Syst..

[20]  Pin-Han Ho,et al.  A Location Privacy Preserving Authentication Scheme in Vehicular Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[21]  Shiuh-Jeng Wang,et al.  Hierarchical key derivation scheme for group-oriented communication systems , 2010, Int. J. Inf. Technol. Commun. Convergence.

[22]  Anand R. Prasad,et al.  Fast Authentication for Inter-domain Handover , 2004, ICT.

[23]  C. Pandu Rangan,et al.  Identity Based Online/Offline Signcryption Scheme , 2010, IACR Cryptol. ePrint Arch..

[24]  Joseph K. Liu,et al.  An Efficient Identity-Based Online/Offline Encryption Scheme , 2009, ACNS.

[25]  Bing He,et al.  On secure communication in integrated heterogeneous wireless networks , 2010, Int. J. Inf. Technol. Commun. Convergence.

[26]  Amrita Saha,et al.  Secure Communication Using Reed-Muller Codes and Partially Balanced Design in Wireless Sensor Network , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.