Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4926
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:36:04Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:36:04Z-
dc.date.issued2018-
dc.identifier.citationGupta, S., Parne, B. L., & Chaudhari, N. S. (2018). A proxy signature based efficient and robust handover AKA protocol for LTE/LTE-A networks. Wireless Personal Communications, 103(3), 2317-2352. doi:10.1007/s11277-018-5912-1en_US
dc.identifier.issn0929-6212-
dc.identifier.otherEID(2-s2.0-85050965987)-
dc.identifier.urihttps://doi.org/10.1007/s11277-018-5912-1-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4926-
dc.description.abstractAn efficient and robust handover is one of the essential requirements of several applications in LTE/LTE-A network. These applications are reliable only after a successful authentication of communication entities. Hence, the third generation partnership project has recommended the handover schemes for different mobility scenarios with a new key management approach that increases the complexity of the overall system. To overcome the above problems, researchers have proposed various handover authentication protocols. But, most of the handover protocols can’t avoid the key escrow problem and suffers from key forward/backward secrecy. Also, these protocols are vulnerable to various malicious attacks and incur high computational overhead during the authentication process. Therefore, these protocols don’t suit for handover authentication in LTE/LTE-A networks. However, researchers have proposed the proxy signature based handover protocols but, these protocols fail to achieve an adequate solution for proxy revocation and necessary security demands. In order to mitigate the aforesaid problems, we propose a proxy signature based efficient and robust handover authentication and key agreement protocol with revocation in LTE/LTE-A network. To prove the correctness of the proposed protocol, the formal analysis is carried out by BAN logic and simulated using the AVISPA tool. Moreover, the security analysis illustrates that the proposed protocol fulfills all the security features and avoids the identified attacks. Finally, the performance analysis of the proposed protocol is shown with existing handover protocols. The analysis shows that the protocol has improved results in terms of transmission, storage, message and computation overhead. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.en_US
dc.language.isoenen_US
dc.publisherSpringer New York LLCen_US
dc.sourceWireless Personal Communicationsen_US
dc.subjectAuthenticationen_US
dc.subjectElectronic document identification systemsen_US
dc.subjectNetwork securityen_US
dc.subjectSecurity systemsen_US
dc.subjectWireless telecommunication systemsen_US
dc.subjectAVISPAen_US
dc.subjectHandover authenticationsen_US
dc.subjectLte/lte-aen_US
dc.subjectProxy signaturesen_US
dc.subjectRevocationen_US
dc.subjectInternet protocolsen_US
dc.titleA Proxy Signature Based Efficient and Robust Handover AKA Protocol for LTE/LTE-A Networksen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: