A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks

In the wireless mobile network (WMN), the handover authentication scheme is the key to ensure fast and secure handoff of mobile nodes among several access points. However, it is difficult to design an appropriate handover authentication protocol for the inherent drawbacks in WMN. For example, the resources of the MN are limited and the mobile nodes have low capability in computing. Therefore, the traditional authentication schemes are unsuited to be applied in WMN for the reason that they have low efficiency. To construct a fast handover authentication protocol, in this paper, we design an anonymous handover authentication protocol with high efficiency by considering the distributed storage, collective maintenance and tamper-resistance. Then, the security and efficiency of the proposal is analyzed, and it is concluded that ours uses chameleon hash with blockchain to achieve robust security and high efficiency. Meanwhile, our scheme satisfies the property of user anonymity, conditional privacy protection and robust key agreement as well.

[1]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[2]  Dragos Velicanu,et al.  CertCoin : A NameCoin Based Decentralized Authentication System 6 . 857 Class Project , 2014 .

[3]  F. Corella Backing Rich Credentials with a Blockchain PKI ∗ , 2016 .

[4]  Qi Han,et al.  Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks , 2012, NSS.

[5]  Jian Shen,et al.  Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network , 2017, Wirel. Pers. Commun..

[6]  Jongin Lim,et al.  Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks , 2009, IEEE Communications Letters.

[7]  Pin-Han Ho,et al.  A Location Privacy Preserving Authentication Scheme in Vehicular Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[8]  Yanghee Choi,et al.  Fast handoff scheme based on mobility prediction in public wireless LAN systems , 2004 .

[9]  Fagen Li,et al.  User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System , 2016, Int. J. Netw. Secur..

[10]  Kefei Chen,et al.  Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation , 2017, Science China Information Sciences.

[11]  Narendra S. Chaudhari,et al.  A Proxy Signature Based Efficient and Robust Handover AKA Protocol for LTE/LTE-A Networks , 2018, Wirel. Pers. Commun..

[12]  Narendra S. Chaudhari,et al.  A Lightweight Handover Authentication Protocol based on Proxy Signature for Wireless Networks , 2017, 2017 14th IEEE India Council International Conference (INDICON).

[13]  Anand R. Prasad,et al.  Fast Authentication for Inter-domain Handover , 2004, ICT.

[14]  Giuseppe Ateniese,et al.  On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.

[15]  Souhwan Jung,et al.  A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6 , 2008, IEICE Trans. Commun..

[16]  Narendra S. Chaudhari,et al.  An efficient handover AKA protocol for wireless network using Chameleon Hash function , 2018, 2018 4th International Conference on Recent Advances in Information Technology (RAIT).

[17]  Wei-Kuan Shih,et al.  Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment , 2009, Comput. Stand. Interfaces.

[18]  Qiong Pu,et al.  An Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[19]  Chun Chen,et al.  A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..

[20]  Cheng-Chi Lee,et al.  A novel user authentication and privacy preserving scheme with smart cards for wireless communications , 2012, Math. Comput. Model..

[21]  Shuenn-Shyang Wang,et al.  A secure dynamic ID based remote user authentication scheme for multi-server environment , 2009, Comput. Stand. Interfaces.

[22]  Souhwan Jung,et al.  A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.

[23]  Wei Ren,et al.  SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography , 2007, 2007 IEEE International Conference on Communications.

[24]  William A. Arbaugh,et al.  Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.

[25]  Narendra S. Chaudhari,et al.  PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network , 2019, Peer Peer Netw. Appl..

[26]  Peilin Hong,et al.  A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks , 2013, Int. J. Netw. Secur..