A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications

  • PDF / 1,775,949 Bytes
  • 15 Pages / 439.37 x 666.142 pts Page_size
  • 55 Downloads / 219 Views

DOWNLOAD

REPORT


A Priority‑Aware Anonymous Handover Authentication Protocol for Wireless Communications Guangsong Li1 · Yongbin Zeng1 · Hui Guang2 · Gang Yu1

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract A fast handover authentication protocol takes an important role for delay-sensitive applications in wireless networks. Mobile users may be granted different priorities depending on communication fees they paid. In this paper, we present a priority-aware anonymous handover authentication protocol using attribute-based cryptography. The proposed protocol realizes mutual authentication, user anonymity, session key establishment and user revocation etc. Particularly it obtains a charming property, namely, user priority. Compared with some existing schemes, it is more efficient while satisfying security. Keywords  Anonymous · Authentication · Key establishment · Priority · Revocation · Wireless network

1 Introduction Various Internet applications interweave with human’s daily life due to dramatic development of Internet technology and information science. In addition, the way we live is gradually changed by wireless networks with large-scale deployment. Handheld devices (e.g. PDAs, smart phones and pads) bring great convenience to daily routine. And in the next generation (5G) mobile communication, applications based mobile devices will increase a lot. Except for traditional voice and data transaction, future business also includes real-time service, such as VoIP, video telephones, mobile TVs, video conferences and online games. Note that, end-to-end delay of data transaction in real-time service is the core. It requires

* Guangsong Li [email protected] Yongbin Zeng [email protected] Hui Guang [email protected] Gang Yu [email protected] 1

State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China

2

Physical Education College of Zhengzhou University, Zhengzhou, China



13

Vol.:(0123456789)



G. Li et al.

such a strict delay, for instance, less than 150 ms delay of streaming media [1]. Wireless mobile networks have attracted a lot of attention from both academia and industry [2–4]. A wireless mobile network has three main types of entities, including several Access Points (APs), an Authentication Server (AS) and a large number of Mobile Nodes (MNs), where the MN represents the user’s handled device. In order to access network resources, an MN needs to connect to an AP and pass the authentication of AS. Clearly, AP has a limited geographical coverage. When a user moves to the edge of the current AP coverage area, it is necessary for the MN to disconnect from the current AP and establish a new connection with another AP. As shown in Fig. 1, a typical handover scenario consists of AS, AP1, AP2, and MN. When MN moves to the coverage of AP1 from that of AP2, MN and AP1 execute the handover authentication protocol. If MN and AP1 authenticate each other successfully, MN could access to network through AP1 again. Otherwise MN loses the connection. However, it is a great chall