Authenticated Hand-Over Algorithm for Group Communication

Shamir or Blakley secret sharing schemes are used for the authentication process in the studies before, but still secure group authentication and hand-over process remain as challenges in group authentication approaches. In this study, a novel method is proposed to provide a secure group authentication. The proposed approach also enables a hand-over process between groups by using Lagrange's polynomial interpolation and Weil pairing in elliptic curve groups for wireless networks with mobility support. One of the advantages of our proposed scheme is that the computational load for a member in the group is lower than the other schemes in the state-of-the-art. It is also possible to authorize many users at the same time, not one-to-one as in the group authentication methods in current cellular networks including Long Term Evolution (LTE). Another advantage that is not covered in other secret sharing methods is that the proposed approach constitutes a practical solution for the hand-over of members between different groups. We have also proposed a solution for replay and man-in-the-middle attacks in secret exchange.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Chun Chen,et al.  Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks , 2012, IEEE Communications Letters.

[3]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[4]  Xuemin Shen,et al.  SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.

[5]  Chun Chen,et al.  Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.

[6]  Nitish Mehta,et al.  Group authentication using paillier threshold cryptography , 2013, 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN).

[7]  Frederik Vercauteren,et al.  Optimal Pairings , 2010, IEEE Transactions on Information Theory.

[8]  Ramjee Prasad,et al.  Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT) , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).

[9]  Leonardo A. Martucci,et al.  A Lightweight Distributed Group Authentication Mechanism , 2004 .

[10]  Mohsen Guizani,et al.  Handover authentication for mobile networks: security and efficiency aspects , 2015, IEEE Network.

[11]  Gicheol Wang,et al.  Authentication and Key Management in an LTE-Based Unmanned Aerial System Control and Non-payload Communication Network , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[12]  Richard E. Smith,et al.  Authentication: From Passwords to Public Keys , 2001 .

[13]  Lein Harn,et al.  Group Authentication , 2013, IEEE Transactions on Computers.

[14]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[15]  Hung-Yu Chien,et al.  Group Authentication with Multiple Trials and Multiple Authentications , 2017, Secur. Commun. Networks.

[16]  Bo Huang,et al.  A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks , 2012, IEEE Communications Letters.

[17]  Varalakshmi Perumal,et al.  Secure and efficient hand-over authentication in WLAN using elliptic curve RSA , 2017, Comput. Electr. Eng..

[18]  A. Sreekumar,et al.  Secret sharing scheme using gray code and XOR operation , 2017, 2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[19]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.