Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4627
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:00Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:00Z-
dc.date.issued2018-
dc.identifier.citationGupta, S., Parne, B. L., & Chaudhari, N. S. (2018). An efficient handover AKA protocol for wireless network using chameleon hash function. Paper presented at the Proceedings of the 4th IEEE International Conference on Recent Advances in Information Technology, RAIT 2018, 1-7. doi:10.1109/RAIT.2018.8389091en_US
dc.identifier.isbn9781538630396-
dc.identifier.otherEID(2-s2.0-85050022094)-
dc.identifier.urihttps://doi.org/10.1109/RAIT.2018.8389091-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4627-
dc.description.abstractThe secure handover Authentication and Key Agreement (AKA) protocols were proposed to fulfill the increasing demands of handover based applications in the wireless network. However, these handover AKA protocols are vulnerable to malicious security attacks, suffer from privacy preservation, key escrow problem and key forward/ backward secrecy (KFS/ KBS). Moreover, these protocols exhibit high overhead and bandwidth consumption during the authentication process. To avoid these problems, we propose an efficient handover AKA protocol by using the double trap-door chameleon hash function in the wireless network. The proposed protocol takes the advantage of trap-door hash key holder to allows the network access. Hence, the proposed handover AKA protocol accommodates all the security features and provides the robust security. Moreover, the protocol avoids the key escrow problem, preserves the privacy of the communication entities and maintains the KFS/KBS. In addition, the formal simulation and security analysis of the proposed protocol are carried out using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The security analysis shows that the protocol is free from various known attacks. Furthermore, the performance analysis of the protocol is carried out in terms of communication and computation overhead. The analysis represents that the protocol is secure and efficient compared to the existing handover protocols. © 2018 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceProceedings of the 4th IEEE International Conference on Recent Advances in Information Technology, RAIT 2018en_US
dc.subjectAuthenticationen_US
dc.subjectHash functionsen_US
dc.subjectInternet protocolsen_US
dc.subjectSecurity systemsen_US
dc.subjectWireless networksen_US
dc.subjectBandwidth consumptionen_US
dc.subjectCommunication entitiesen_US
dc.subjectComputation overheadsen_US
dc.subjectHandoveren_US
dc.subjectKFS/KBS and AVISPAen_US
dc.subjectPerformance analysisen_US
dc.subjectPrivacy preservationen_US
dc.subjectSecurity featuresen_US
dc.subjectNetwork securityen_US
dc.titleAn efficient handover AKA protocol for wireless network using Chameleon Hash functionen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: