Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4926
Title: A Proxy Signature Based Efficient and Robust Handover AKA Protocol for LTE/LTE-A Networks
Authors: Chaudhari, Narendra S.
Keywords: Authentication;Electronic document identification systems;Network security;Security systems;Wireless telecommunication systems;AVISPA;Handover authentications;Lte/lte-a;Proxy signatures;Revocation;Internet protocols
Issue Date: 2018
Publisher: Springer New York LLC
Citation: Gupta, S., Parne, B. L., & Chaudhari, N. S. (2018). A proxy signature based efficient and robust handover AKA protocol for LTE/LTE-A networks. Wireless Personal Communications, 103(3), 2317-2352. doi:10.1007/s11277-018-5912-1
Abstract: An efficient and robust handover is one of the essential requirements of several applications in LTE/LTE-A network. These applications are reliable only after a successful authentication of communication entities. Hence, the third generation partnership project has recommended the handover schemes for different mobility scenarios with a new key management approach that increases the complexity of the overall system. To overcome the above problems, researchers have proposed various handover authentication protocols. But, most of the handover protocols can’t avoid the key escrow problem and suffers from key forward/backward secrecy. Also, these protocols are vulnerable to various malicious attacks and incur high computational overhead during the authentication process. Therefore, these protocols don’t suit for handover authentication in LTE/LTE-A networks. However, researchers have proposed the proxy signature based handover protocols but, these protocols fail to achieve an adequate solution for proxy revocation and necessary security demands. In order to mitigate the aforesaid problems, we propose a proxy signature based efficient and robust handover authentication and key agreement protocol with revocation in LTE/LTE-A network. To prove the correctness of the proposed protocol, the formal analysis is carried out by BAN logic and simulated using the AVISPA tool. Moreover, the security analysis illustrates that the proposed protocol fulfills all the security features and avoids the identified attacks. Finally, the performance analysis of the proposed protocol is shown with existing handover protocols. The analysis shows that the protocol has improved results in terms of transmission, storage, message and computation overhead. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.
URI: https://doi.org/10.1007/s11277-018-5912-1
https://dspace.iiti.ac.in/handle/123456789/4926
ISSN: 0929-6212
Type of Material: Journal Article
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: