An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks

In this paper, we propose a handover authentication scheme with location privacy preserving based on the proxy ring signature scheme for EAP-based wireless networks. First, we integrate an efficient ring signature and a proxy signature into a proxy ring signature scheme, which allows the mobile node (MN) to be authenticated without revealing its identity and location privacies due to the inherent anonymity of the proxy ring signature. Second, our scheme only requires point multiplication operations on the resource-constraints MN, thus, it is suitable for low-power mobile devices in the wireless networks. Finally, an extensive simulation is given to validate the performance of the proposed scheme. The results demonstrate that our scheme is relatively efficient in terms of computation and communication overhead.

[1]  Ieee Microwave Theory,et al.  IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Draft Amendment: Management Information Base Extensions , 2007 .

[2]  Yi Mu,et al.  An efficient anonymous proxy signature scheme with provable security , 2009, Comput. Stand. Interfaces.

[3]  Christos Politis,et al.  Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks , 2004, IEEE Wirel. Commun..

[4]  Dengguo Feng,et al.  ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.

[5]  Siu-Ming Yiu,et al.  Efficient Identity Based Ring Signature , 2005, ACNS.

[6]  A. Ramachandran,et al.  Computing Cryptographic Algorithms in Portable and Embedded Devices , 2007, 2007 IEEE International Conference on Portable Information Devices.

[7]  Guoqiang Bai,et al.  Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .

[8]  Antonio F. Gómez-Skarmeta,et al.  Privacy-enhanced fast re-authentication for EAP-based next generation network , 2010, Comput. Commun..

[9]  Anmin Fu,et al.  A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m , 2010, IEEE Communications Letters.

[10]  Pin-Han Ho,et al.  A Location Privacy Preserving Authentication Scheme in Vehicular Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[11]  Costas Lambrinoudakis,et al.  Privacy preserving context transfer schemes for 4G networks , 2011, Wirel. Commun. Mob. Comput..

[12]  Eun-Jun Yoon,et al.  Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing , 2010, IEICE Trans. Inf. Syst..

[13]  Anmin Fu,et al.  A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[14]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[15]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[16]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[17]  Charles E. Perkins,et al.  Context Transfer Protocol (CXTP) , 2005, RFC.

[18]  Anmin Fu,et al.  EKMP: An enhanced key management protocol for IEEE 802.16m , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[19]  Souhwan Jung,et al.  A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.

[20]  Wei Ren,et al.  SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography , 2007, 2007 IEEE International Conference on Communications.