4.7 Article

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography

期刊

COMPUTER NETWORKS
卷 128, 期 -, 页码 154-163

出版社

ELSEVIER
DOI: 10.1016/j.comnet.2016.12.013

关键词

Anonymity; Handover authentication; Protocol; Provable security; Wireless network

资金

  1. National Natural Science Foundation of China [61272112, 61472287, 61572370, 61572379, 61501333, U1536204, 61272522]
  2. National High-Tech Research and Development Program of China (863 Program) [2015AA016004]
  3. Guangxi Key Laboratory of Cryptography and Information Security [GCIS201608]
  4. Natural Science Foundation of Hubei Province of China [2015CFB257]

向作者/读者索取更多资源

The handover authentication protocol plays an important role in mobile wireless networks where mobile devices often need to securely and seamlessly roam among different access points. To satisfy various security and privacy requirements of practical wireless applications, many handover authentication protocols for mobile wireless networks have been proposed in the last decade. In particular, the handover authentication protocol using the Identity-based Public Key Cryptography (ID-based PKC) has better security and has attracted a lot of attention recently. Here, we discuss the security and privacy requirements of handover authentication protocols for mobile wireless networks and we present a brief review of handover authentication protocols using the ID-based PKC technique. Our security analysis shows that only one of the recent protocols proposed can satisfy all security and function requirements. We also implement and compare the communication and computation costs associated with these protocols on a specific mobile device. (C) 2016 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据