Show simple item record

AuthorHe, Daojing
AuthorChan, Sammy
AuthorGuizani, Mohsen
Available date2022-11-10T09:47:24Z
Publication Date2015
Publication NameIEEE Network
ResourceScopus
Resource2-s2.0-84930934048
URIhttp://dx.doi.org/10.1109/MNET.2015.7113232
URIhttp://hdl.handle.net/10576/36151
AbstractA handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task because wireless networks are susceptible to attacks, and mobile nodes have limited power and processing capability. In this article, we identify the security and efficiency requirements of a good handover authentication protocol and analyze the existing related protocols, and show that many such protocols are either insecure or inefficient. Then we review a recently proposed protocol named PairHand, which has been shown to outperform all other protocols on security and efficiency. Furthermore, we propose a novel protocol named HashHand that not only inherits the merits of Pair- Hand and efficiently eliminates its security vulnerabilities, but also provides a session key update mechanism. Experiments using our implementation on resource-limited laptop PCs show that HashHand is feasible for practical mobile networks. 2015 IEEE.
Languageen
PublisherInstitute of Electrical and Electronics Engineers Inc.
SubjectAuthentication
Efficiency
Mobile telecommunication systems
Wireless networks
Efficiency requirements
Handover authentications
Mobile nodes
Multiple access points
Processing capability
Security vulnerabilities
Session key
Mobile security
TitleHandover authentication for mobile networks: Security and efficiency aspects
TypeArticle
Pagination96-103
Issue Number3
Volume Number29


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record