Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4621
Title: A Lightweight Handover Authentication Protocol based on Proxy Signature for Wireless Networks
Authors: Chaudhari, Narendra S.
Keywords: Authentication;Cryptography;Internet protocols;Wireless networks;Authentication and key agreements;Communication entities;Computation overheads;EAP-AKA;Handover authentications;Key forward/backward secrecy;Proxy signatures;Secure authentications;Network security
Issue Date: 2018
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: Gupta, S., Parne, B. L., & Chaudhari, N. S. (2018). A lightweight handover authentication protocol based on proxy signature for wireless networks. Paper presented at the 2017 14th IEEE India Council International Conference, INDICON 2017, doi:10.1109/INDICON.2017.8488142
Abstract: The authentication and key agreement (AKA) protocols plays an improtant role to validate the communication entities in the wireless network. The applications of the wireless networks are secure only after the successful authentication of the communication entities during the handover. To obtain the secrecy in these applications, various handover protocols have been proposed. Unfortunately, most of the existing handover protocols suffer from key escrow problem and can't achieve the key forward/backward secrecy. Moreover, these protocols incur various identified attacks and high bandwidth consumption during the handover process. Hence, these protocols are not suitable for secure authentication in wireless networks. However, the proxy signature based handover protocols are also proposed by the researchers but, these protocols fail to accomplish all the security properties. To overcome the above problems, we propose the proxy signature based lightweight handover authentication protocol for wireless network. The proposed protocol fulfills all the security demands and avoids the identified attacks. The security analysis of the protocol proves the security against the malicious attacks. Finally, the performance analysis shows that the protocol obtains the improved results in terms of the communication and computation overhead compared to existing protocols. © 2017 IEEE.
URI: https://doi.org/10.1109/INDICON.2017.8488142
https://dspace.iiti.ac.in/handle/123456789/4621
ISBN: 9781538643181
Type of Material: Conference Paper
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: