Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4621
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:34:59Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:34:59Z-
dc.date.issued2018-
dc.identifier.citationGupta, S., Parne, B. L., & Chaudhari, N. S. (2018). A lightweight handover authentication protocol based on proxy signature for wireless networks. Paper presented at the 2017 14th IEEE India Council International Conference, INDICON 2017, doi:10.1109/INDICON.2017.8488142en_US
dc.identifier.isbn9781538643181-
dc.identifier.otherEID(2-s2.0-85056376302)-
dc.identifier.urihttps://doi.org/10.1109/INDICON.2017.8488142-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4621-
dc.description.abstractThe authentication and key agreement (AKA) protocols plays an improtant role to validate the communication entities in the wireless network. The applications of the wireless networks are secure only after the successful authentication of the communication entities during the handover. To obtain the secrecy in these applications, various handover protocols have been proposed. Unfortunately, most of the existing handover protocols suffer from key escrow problem and can't achieve the key forward/backward secrecy. Moreover, these protocols incur various identified attacks and high bandwidth consumption during the handover process. Hence, these protocols are not suitable for secure authentication in wireless networks. However, the proxy signature based handover protocols are also proposed by the researchers but, these protocols fail to accomplish all the security properties. To overcome the above problems, we propose the proxy signature based lightweight handover authentication protocol for wireless network. The proposed protocol fulfills all the security demands and avoids the identified attacks. The security analysis of the protocol proves the security against the malicious attacks. Finally, the performance analysis shows that the protocol obtains the improved results in terms of the communication and computation overhead compared to existing protocols. © 2017 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.source2017 14th IEEE India Council International Conference, INDICON 2017en_US
dc.subjectAuthenticationen_US
dc.subjectCryptographyen_US
dc.subjectInternet protocolsen_US
dc.subjectWireless networksen_US
dc.subjectAuthentication and key agreementsen_US
dc.subjectCommunication entitiesen_US
dc.subjectComputation overheadsen_US
dc.subjectEAP-AKAen_US
dc.subjectHandover authenticationsen_US
dc.subjectKey forward/backward secrecyen_US
dc.subjectProxy signaturesen_US
dc.subjectSecure authenticationsen_US
dc.subjectNetwork securityen_US
dc.titleA Lightweight Handover Authentication Protocol based on Proxy Signature for Wireless Networksen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: