A proxy signature-based handover authentication scheme for LTE wireless networks

A seamless and secure handover is always one of the important design goals of the cellular networks. The handover scheme of 4G Long Term Evolution (LTE) wireless networks is complex due to the presence of two possible different types of base stations. In LTE communication systems, a normal base station is referred to as an eNodeB (eNB). What increases the level of complexity of the system is the fact that the other kind of base stations, namely, Home eNodeB (HeNB), cannot directly communicate with eNB. In the LTE networks, the handover scenarios involving a HeNB could result in a complicated handover procedure. Besides, since key chains have been used in the handover processes, it is found to be lack of backward security. Therefore, in order to handle the handover involving a HeNB efficiently with security provisioning, in this paper, a proxy signature-based handover scheme is proposed. The proposed scheme works based on the Elliptic Curve Cryptography (ECC) algorithm, which makes the computational cost of the handover process smaller compared to other handover schemes.

[1]  William A. Arbaugh,et al.  An empirical analysis of the IEEE 802.11 MAC layer handoff process , 2003, CCRV.

[2]  Hyoung-Kee Choi,et al.  Building Femtocell More Secure with Improved Proxy Signature , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[3]  Jin Cao,et al.  A simple and robust handover authentication between HeNB and eNB in LTE networks , 2012, Comput. Networks.

[4]  Faouzi Zarai,et al.  Secure handoff protocol in 3GPP LTE networks , 2012, Third International Conference on Communications and Networking.

[5]  Paul F. Syverson,et al.  The Logic of Authentication Protocols , 2000, FOSAD.

[6]  Noureddine Zahid,et al.  Security analysis of 3GPP (LTE) — WLAN interworking and a new local authentication method based on EAP-AKA , 2012, The First International Conference on Future Generation Communication Technologies.

[7]  Yuh-Shyan Chen,et al.  A Secure Relay-Assisted Handover Protocol for Proxy Mobile IPv6 in 3GPP LTE Systems , 2011, Wirel. Pers. Commun..

[8]  William A. Arbaugh,et al.  Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.

[9]  Souhwan Jung,et al.  A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.

[10]  Peilin Hong,et al.  A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks , 2013, Int. J. Netw. Secur..

[11]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[12]  Wei Ren,et al.  SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography , 2007, 2007 IEEE International Conference on Communications.

[13]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[14]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution, Second Edition , 2011 .

[15]  Levente Buttyán,et al.  An authentication scheme for fast handover between WiFi access points , 2010 .

[16]  Gerard J. Holzmann,et al.  The SPIN Model Checker - primer and reference manual , 2003 .

[17]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[18]  Gerard J. Holzmann,et al.  The SPIN Model Checker , 2003 .

[19]  Yang Dacheng,et al.  A Novel Network Architecture for 3G Evolution , 2006, 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications.

[20]  Anmin Fu,et al.  A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[21]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[22]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[23]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.

[24]  Dan Forsberg,et al.  LTE key management analysis with session keys context , 2010, Comput. Commun..