An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks

The convergence of wireless access networks significantly changes the way we live and work, bringing us closer to the goal of computing anywhere at any time. Security, privacy, accountability, and efficiency issues are of most concern in the deployment of such networks. Despite the need and importance, little research has been conducted on designing accountable and privacy-preserving authentication schemes for wireless access networks, not to mention schemes that can simultaneously and efficiently provide accountability and privacy protection without involving any trusted third party. This motivates us to develop a novel authentication framework, namely APEA, that integrates a new key management protocol, i.e., an adapted construction of short group signature (SGS) and batch verification, as an effective approach to simultaneously achieve the four goals without involving any trusted third party. Experiments using our implementation on laptop PCs demonstrate that APEA is feasible in practice.

[1]  Chun Chen,et al.  Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks , 2013, IEEE Transactions on Computers.

[2]  Xiaohui Liang,et al.  FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[3]  Xiaotie Deng,et al.  Universal authentication protocols for anonymous wireless communications , 2010, IEEE Transactions on Wireless Communications.

[4]  Chun Chen,et al.  A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..

[5]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[6]  A. Miyaji,et al.  New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .

[7]  Jacques Stern,et al.  Efficient Revocation in Group Signatures , 2001, Public Key Cryptography.

[8]  Jianhong Zhang,et al.  A Novel Efficient Group Signature Scheme with Forward Security , 2003, ICICS.

[9]  Jipeng Zhou,et al.  Preventing delegation-based mobile authentications from man-in-the-middle attacks , 2012, Comput. Stand. Interfaces.

[10]  Pin-Han Ho,et al.  AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[11]  Arati Baliga,et al.  An identity-based security framework For VANETs , 2006, VANET '06.

[12]  Sanghamitra Panda,et al.  Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2015 .

[13]  Chin-Chen Chang,et al.  An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[14]  Yuh-Ren Tsai,et al.  SIM-based subscriber authentication mechanism for wireless local area networks , 2006, Comput. Commun..

[15]  Chin-Chen Chang,et al.  Roaming across wireless local area networks using SIM-based authentication protocol , 2009, Comput. Stand. Interfaces.

[16]  Chun Chen,et al.  Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.

[17]  Yih-Chun Hu,et al.  The impact of key assignment on VANET privacy , 2010, Secur. Commun. Networks.

[18]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[19]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.