Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography

Debiao He, Sherali Zeadally, Libing Wu, Huaqun Wang

Research output: Contribution to journalArticlepeer-review

23 Scopus citations

Abstract

The handover authentication protocol plays an important role in mobile wireless networks where mobile devices often need to securely and seamlessly roam among different access points. To satisfy various security and privacy requirements of practical wireless applications, many handover authentication protocols for mobile wireless networks have been proposed in the last decade. In particular, the handover authentication protocol using the Identity-based Public Key Cryptography (ID-based PKC) has better security and has attracted a lot of attention recently. Here, we discuss the security and privacy requirements of handover authentication protocols for mobile wireless networks and we present a brief review of handover authentication protocols using the ID-based PKC technique. Our security analysis shows that only one of the recent protocols proposed can satisfy all security and function requirements. We also implement and compare the communication and computation costs associated with these protocols on a specific mobile device.

Original languageEnglish
Pages (from-to)154-163
Number of pages10
JournalComputer Networks
Volume128
DOIs
StatePublished - Dec 9 2017

Bibliographical note

Funding Information:
We thank the anonymous reviewers for the constructive comments, which help improved the quality and presentation of this paper. The work of D. He was supported in part by the National Natural Science Foundation of China (Nos. 61572379 , 61501333 , U1536204 ), in part by the National High-Tech Research and Development Program of China (863 Program) (No. 2015AA016004), in part by the open fund of Guangxi Key Laboratory of Cryptography (No. GCIS201608) and Information Security and in part by the Natural Science Foundation of Hubei Province of China (No. 2015CFB257). The work of L. Wu was supported by the National Natural Science Foundation of China (Nos. 61272112 , 61472287 , 61572370 ). The work of H. Wang was supported by the National Natural Science Foundation of China (No. 61272522 ).

Publisher Copyright:
© 2016 Elsevier B.V.

Keywords

  • Anonymity
  • Handover authentication
  • Protocol
  • Provable security
  • Wireless network

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography'. Together they form a unique fingerprint.

Cite this