Handover authentication for mobile networks: Security and efficiency aspects
Author | He, Daojing |
Author | Chan, Sammy |
Author | Guizani, Mohsen |
Available date | 2022-11-10T09:47:24Z |
Publication Date | 2015 |
Publication Name | IEEE Network |
Resource | Scopus |
Resource | 2-s2.0-84930934048 |
Abstract | A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task because wireless networks are susceptible to attacks, and mobile nodes have limited power and processing capability. In this article, we identify the security and efficiency requirements of a good handover authentication protocol and analyze the existing related protocols, and show that many such protocols are either insecure or inefficient. Then we review a recently proposed protocol named PairHand, which has been shown to outperform all other protocols on security and efficiency. Furthermore, we propose a novel protocol named HashHand that not only inherits the merits of Pair- Hand and efficiently eliminates its security vulnerabilities, but also provides a session key update mechanism. Experiments using our implementation on resource-limited laptop PCs show that HashHand is feasible for practical mobile networks. 2015 IEEE. |
Language | en |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Subject | Authentication Efficiency Mobile telecommunication systems Wireless networks Efficiency requirements Handover authentications Mobile nodes Multiple access points Processing capability Security vulnerabilities Session key Mobile security |
Type | Article |
Pagination | 96-103 |
Issue Number | 3 |
Volume Number | 29 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2402 items ]