Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks

Existing mechanisms for handover authentication mainly focus on designing a secure authentication module, little attention has been paid to protect users' privacy when they are authenticated by the access points for data access. Further, most existing approaches do not support user revocation. In this paper, we present a secure and efficient authentication protocol named Handauth. Similar to the mechanisms of this field, Handauth provides user authentication and session key establishment. However, compared to other well-known approaches, Handauth not only enjoys both computation and communication efficiency, but also achieves strong user anonymity and untraceablility, forward secure user revocation, conditional privacy-preservation, AAA server anonymity, access service expiration management, access point authentication, easily scheduled revocation, dynamic user revocation and attack resistance. Experimental results show that the proposed approach is feasible for real applications.

[1]  Jacques Stern,et al.  Efficient Revocation in Group Signatures , 2001, Public Key Cryptography.

[2]  Chun Chen,et al.  Lightweight and provably secure user authentication with anonymity for the global mobility network , 2011, Int. J. Commun. Syst..

[3]  Souhwan Jung,et al.  A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.

[4]  Wei Ren,et al.  SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography , 2007, 2007 IEEE International Conference on Communications.

[5]  Yanghee Choi,et al.  Fast handoff scheme based on mobility prediction in public wireless LAN systems , 2004 .

[6]  Chun Chen,et al.  A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..

[7]  Srinivasan Seshan,et al.  802.11 user fingerprinting , 2007, MobiCom '07.

[8]  Nobuo Funabiki,et al.  Revocable Group Signature Schemes with Constant Costs for Signing and Verifying , 2009, Public Key Cryptography.

[9]  Duncan S. Wong,et al.  Efficient Group Signature with Forward Secure Revocation , 2009, FGIT-SecTech.

[10]  Stephan Merz,et al.  Model Checking , 2000 .

[11]  Toru Nakanishi,et al.  A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups , 2004, ACISP.

[12]  Simon Blake-Wilson,et al.  EAP Tunneled TLS Authentication Protocol (EAP-TTLS) , 2004 .

[13]  Myungsik Yoo,et al.  A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks , 2009, NEW2AN.

[14]  N. Asokan,et al.  Untraceability in mobile networks , 1995, MobiCom '95.

[15]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[16]  Chun Chen,et al.  Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks , 2011, Wirel. Pers. Commun..

[17]  Chin-Chen Chang,et al.  An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[18]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[19]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[20]  Daojing He,et al.  A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network , 2010, 2010 13th International Conference on Network-Based Information Systems.

[21]  Souhwan Jung,et al.  A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6 , 2008, IEICE Trans. Commun..

[22]  Anand R. Prasad,et al.  Fast Authentication for Inter-domain Handover , 2004, ICT.

[23]  Qiong Pu,et al.  An Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks , 2010, 2010 Second International Conference on Multimedia and Information Technology.