Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4897
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:56Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:56Z-
dc.date.issued2019-
dc.identifier.citationGupta, S., Parne, B. L., & Chaudhari, N. S. (2019). PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network. Peer-to-Peer Networking and Applications, 12(4), 989-1011. doi:10.1007/s12083-018-0703-8en_US
dc.identifier.issn1936-6442-
dc.identifier.otherEID(2-s2.0-85059015984)-
dc.identifier.urihttps://doi.org/10.1007/s12083-018-0703-8-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4897-
dc.description.abstractIn order to accomplish the increasing security demands of handover-based applications such as mobile multimedia services and transportation system, various handover Authentication and Key Agreement (AKA) protocols were proposed by the researchers in Long Term Evolution-Advanced (LTE-A) network. However, these AKA protocols fail to preserve the privacy of communication entities and suffer from numerous attacks. In addition, these protocols incur high network overhead which doesn’t suit for the resource-constrained mobile devices in LTE/LTE-A network. Also, the protocols can’t establish the key forward/backward secrecy (KFS/KBS) and overcome the key escrow problem. To avoid the above-mentioned security issues, we propose the provably secure and efficient handover (PSEH)-AKA protocol based on double-trapdoor chameleon hash function. The PSEH-AKA protocol is proven secure under random oracle model to obtain the mutual authentication, session key secrecy, integrity and resistance from malicious attacks. The proposed handover protocol accommodates all the security demands such as KFS/KBS, privacy-preservation and establishes the secure session key between the communication entities. Furthermore, the formal verification using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool shows the correctness and informal analysis shows the security properties of the protocol. The performance evaluation of the PSEH-AKA protocol is carried out with existing handover AKA protocols in terms of storage, communication, and computation overhead. The evaluation results show that the protocol achieves substantial efficiency and secure against the identified attacks. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.en_US
dc.language.isoenen_US
dc.publisherSpringer New York LLCen_US
dc.sourcePeer-to-Peer Networking and Applicationsen_US
dc.subjectAuthenticationen_US
dc.subjectFunction evaluationen_US
dc.subjectHash functionsen_US
dc.subjectInternet protocolsen_US
dc.subjectLong Term Evolution (LTE)en_US
dc.subjectMobile securityen_US
dc.subjectMobile telecommunication systemsen_US
dc.subjectMultimedia servicesen_US
dc.subjectNetwork protocolsen_US
dc.subjectWireless telecommunication systemsen_US
dc.subjectAVISPAen_US
dc.subjectCommunication entitiesen_US
dc.subjectComputation overheadsen_US
dc.subjectHandover authenticationsen_US
dc.subjectMobile multimedia servicesen_US
dc.subjectMutual authenticationen_US
dc.subjectPerformance evaluationsen_US
dc.subjectRandom Oracle modelen_US
dc.subjectNetwork securityen_US
dc.titlePSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A networken_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: