SCIENCE CHINA Information Sciences, Volume 60, Issue 5: 052104(2017) https://doi.org/10.1007/s11432-016-0161-2

## Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation

Debiao HE1,2,*, Qi XIE4,
• AcceptedJun 3, 2016
• PublishedNov 14, 2016
Share
Rating

### Abstract

With the development of the wireless communication technology and the popularity of mobile devices, the mobile wireless network (MWN) has been widely used in our daily life. Through the access point (AP), users could access the Internet anytime and anywhere using their mobile devices. Therefore, MWNs can bring much convenience to us. Due to the limitation of AP's coverage, the seamless handover frequently occurs in practical applications. How to guarantee the user's privacy and security and identify the real identity when he/she brings harm to the system becomes very challenging. To achieve such goals, many anonymous handover authentication (AHA) protocols have been proposed in the last several years. However, most of them have high computation costs because mobile nodes need to carry out the bilinear pairing operations or the hash-to-point operations. Besides, most of them cannot satisfy some critical requirements, such as non-traceability and perfect forward secrecy. In this paper, we first outline the security requirements of AHA protocols, and then propose a new AHA protocol to eliminate weaknesses existing in previous AHA protocols. Based on the hardness of two famous mathematical problems, we demonstrate that the proposed AHA protocol is secure against different kinds of attacks and can meet a variety of security requirements. It can be seen from the details of implementations that the proposed AHA protocol also has much less computation cost than three latest AHA protocols.

### Funded by

National Natural Science Foundation of China(61501333)

. The work of Xie Q was supported by Natural Science Foundation of Zhejiang Province(LZ12F02005)

Open Foundation of the State Key Laboratory of Cryptology and Natural Science Foundation of Hubei Province(2015CFB257)

National Natural Science Foundation of China(61133014)

"source" : null , "contract" : "2013CB834205"

National Natural Science Foundation of China(61472114)

"source" : null , "contract" : "2015AA016004"

National High Technology Research and Development Program of China(863 Program)

National Natural Science Foundation of China(U1536204)

. The work of Wang D was supported by National Natural Science Foundation of China(61472016)

National Basic Research Program of China(973 Program)

National Natural Science Foundation of China(61572379)

### Acknowledgment

Acknowledgments

The work of He D B was supported by National Natural Science Foundation of China (Grant Nos. 61572379, 61501333, U1536204), National High Technology Research and Development Program of China (863 Program) (Grant No. 2015AA016004), Open Foundation of the State Key Laboratory of Cryptology, and Natural Science Foundation of Hubei Province (Grant No. 2015CFB257). The work of Wang D was supported by National Natural Science Foundation of China (Grant No. 61472016). The work of Xie Q was supported by Natural Science Foundation of Zhejiang Province (Grant No. LZ12F02005), National Basic Research Program of China (973 Program) (Grant No. 2013CB834205), and National Natural Science Foundation of China (Grant Nos. 61133014, 61472114).

### References

[1] Zheng X, Chen Y, Wang H, et al. Neighborhood prediction based decentralized key management for mobile wireless networks. Wirel Netw, 2013, 19: 1387-1406 CrossRef Google Scholar

[2] Tu H, Kumar N, He D, et al. An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks. J Supercomput, 2014, 70: 224-235 CrossRef Google Scholar

[3] Jo H, Paik J, Lee D. Efficient privacy-preserving authentication in wireless mobile networks. IEEE Trans Mobile Comput, 2014, 13: 1469-1481 CrossRef Google Scholar

[4] He D B, Zeadally S, Kumar N, et al. Anonymous authentication for wireless body area networks with provable security. IEEE Syst J, in press, doi: 10-1481 Google Scholar

[5] He D B, Kumar N, Shen H, et al. One-to-many authentication for access control in mobile pay-tv systems. Sci China Inf Sci, 2016, 59: 052108-1481 CrossRef Google Scholar

[6] Shen H, Li Z, Chen K. A scalable and mobility-resilient data search system for large-scale mobile wireless networks. IEEE Trans Parall Distrib Syst, 2014, 25: 1124-1134 CrossRef Google Scholar

[7] Liang C, Yu F, Zhang X. Information-centric network function virtualization over 5G mobile wireless networks. IEEE Netw, 2015, 29: 68-74 Google Scholar

[8] Menezes A J, Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. Boca Raton: CRC Press, 1996. Google Scholar

[9] Choi J, Jung S. A secure and efficient handover authentication based on light-weight diffe-hellman on mobile node in fmipv6. IEICE Trans Commun, 2008, 91: 605-608 Google Scholar

[10] Yang G, Huang Q, Wong D, et al. Universal authentication protocols for anonymous wireless communications. IEEE Trans Wirel Commun, 2010, 9: 168-174 CrossRef Google Scholar

[11] He D, Bu J, Chan S, et al. Privacy-preserving universal authentication protocol for wireless communications. IEEE Trans Wirel Commun, 2011, 10: 431-436 CrossRef Google Scholar

[12] He D, Bu J, Chan S, et al. Handauth: efficient handover authentication with conditional privacy for wireless networks. IEEE Trans Comput, 2013, 62: 616-622 CrossRef Google Scholar

[13] He D, Chen C, Chan S, et al. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans Wirel Commun, 2012, 11: 48-53 CrossRef Google Scholar

[14] He D, Chen C, Chan S, et al. Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Commun Lett, 2012, 16: 1270-1273 CrossRef Google Scholar

[15] Yeo S, Yap W, Liu J, et al. Comments on analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions". IEEE Commun Lett, 2013, 17: 1521-1523 CrossRef Google Scholar

[16] Tsai J, Lo N, Wu T. Secure handover authentication protocol based on bilinear pairings. Wirel Personal Commun, 2013, 73: 1037-1047 CrossRef Google Scholar

[17] Wang W, Hu L. A secure and efficient handover authentication protocol for wireless networks. Sensors, 2014, 14: 11379-11394 CrossRef Google Scholar

[18] He D, Khan M, Kumar N. A new handover authentication protocol based on bilinear pairing functions for wireless networks. Int J Ad Hoc Ubiquit Comput, 2015, 18: 67-74 CrossRef Google Scholar

[19] Li G, Jiang Q, Wei F, et al. A new privacy-aware handover authentication scheme for wireless networks. Wirel Personal Commun, 2015, 80: 581-589 CrossRef Google Scholar

[20] Xie Y, Wu L, Kumar N, et al. Analysis and improvement of a privacy-aware handover authentication scheme for wireless network. Wirel Personal Commun, doi: 10.1007/s11277-016-3352-3. Google Scholar

[21] Fu A M, Qin N Y, Wang Y L, et al. Nframe: a privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for lte/lte-a networks. Wirel Netw, in press. doi: 10.1007/s11276-016-1277-0. Google Scholar

[22] Choi K Y, Hwang J Y, Lee D H, et al. Id-based authenticated key agreement for low-power mobile devices. In: Proceedings of the 10th Australasian Conference on Information Security and Privacy, Brisbane, 2005. 494--505. Google Scholar

[23] Huang X, Xiang Y, Bertino E, et al. Robust multi-factor authentication for fragile communications. IEEE Trans Depend Secure Comput, 2014, 11: 568-581 CrossRef Google Scholar

[24] Huang X, Xiang Y, Chonka A, et al. A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parall Distr Syst, 2011, 22: 1390-1397 CrossRef Google Scholar

[25] Shen J, Tan H, Moh S, et al. Enhanced secure sensor association and key management in wireless body area networks. J Commun Netw, 2015, 17: 453-462 CrossRef Google Scholar

[26] Xie S, Wang Y. Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel Personal Commun, 2014, 78: 231-246 CrossRef Google Scholar

[27] Wang D, He D, Wang P, et al. Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Depend Secure Comput, 2015, 12: 428-442 CrossRef Google Scholar

[28] Wang D, Wang N, Wang P, et al. Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf Sci, 2015, 321: 162-178 CrossRef Google Scholar

[29] Guo P, Wang J, Li B, et al. A variable threshold-value authentication architecture for wireless mesh networks. J Int Tech, 2014, 15: 929-936 Google Scholar

[30] He D, Zeadally S, Kumar N, et al. Efficient and anonymous mobile user authentication protocol using self-certied public key cryptography for multi-server architectures. IEEE Trans Inf Foren Secur, in press. doi: 10.1109/TIFS.2016.2573746. Google Scholar

[31] Shim K. Cpas: an efficient conditional privacy-preserving authentication scheme for sehicular sensor vetworks. IEEE Trans Veh Tech, 2012, 61: 1874-1883 CrossRef Google Scholar

[32] Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. J Cryptol, 2000, 13: 361-396 CrossRef Google Scholar

Citations

• #### 0

Altmetric

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有