Title: Lightweight handover authentication with location privacy-preserving in mobile wireless networks

Authors: Ling Liu; Hanyu Quan; Xuefeng Liu; Yuqing Zhang

Addresses: The National Key Laboratory of Integrated Services Networks, Xidian University, No. 2, Taibai Road, Xian City 710071, Shaanxi Province, China ' The National Key Laboratory of Integrated Services Networks, Xidian University, No. 2, Taibai Road, Xian City 710071, Shaanxi Province, China ' The National Key Laboratory of Integrated Services Networks, Xidian University, No. 2, Taibai Road, Xian City 710071, Shaanxi Province, China ' The National Computer Network Intrusion Protection Center, Graduate University of Chinese Academy of Sciences, No. 19, Yuquan Road, Beijing 100049, China

Abstract: A secure and efficient handover authentication protocol is highly desirable in mobile wireless networks. In this paper, we propose an efficient handover authentication scheme using the (ID) identity-based signcryption technique. The ID-based cryptosystems have found wide applications in mobile wireless networks for their ellipsis of the verification of public keys and the transmission of associated certificates. Different from traditional signature-then-encryption approach, the signcryption technique can considerably reduce the computation cost by enabling a sender to sign and encrypt data in a single operation. Based on the above cryptographical techniques, only four point multiplications need to be calculated on a resource-constrained mobile node during the handover process. In addition, security analysis demonstrates that our scheme achieves the location privacy-preserving for mobile users and perfect forward/backward secrecy.

Keywords: handover authentication; mobile networks; wireless networks; location privacy; identity based signcryption; ID based cryptosystems; embedded systems; network security; cryptography; privacy preservation; privacy protection; public keys; public key verification.

DOI: 10.1504/IJES.2015.072374

International Journal of Embedded Systems, 2015 Vol.7 No.3/4, pp.280 - 288

Received: 14 Jul 2014
Accepted: 03 Dec 2014

Published online: 11 Oct 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article