scispace - formally typeset
Journal ArticleDOI

Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks

TLDR
This paper proposes a novel privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing to fit in with all of the mobility scenarios in the LTE/LTE-A networks, which is called Nframe.
Abstract
Seamless handover between the evolved universal terrestrial radio access network and other access networks is highly desirable to mobile equipments in the long term evolution (LTE) or LTE-Advanced (LTE-A) networks, but ensuring security and efficiency of this process is challenging. In this paper, we propose a novel privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing to fit in with all of the mobility scenarios in the LTE/LTE-A networks, which is called Nframe. To the best of our knowledge, Nframe is the first to support protecting users’ privacy with non-frameability in the handover process. Moreover, Nframe uses pairing-free identity based cryptographic method to secure handover process and to achieve high efficiency. The formal verification by the AVISPA tool shows that Nframe is secure against various malicious attacks and the simulation result indicates that it outperforms the existing schemes in terms of computation and communication cost.

read more

Citations
More filters
Posted Content

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes

TL;DR: A comprehensive survey of authentication and privacy-preserving schemes for 4G and 5G cellular networks can be found in this paper, where the authors provide an overview of existing surveys that deal with 4G communications, applications, standardization, and security.
Journal ArticleDOI

Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation

TL;DR: The proposed AHA protocol is secure against different kinds of attacks and can meet a variety of security requirements, and has much less computation cost than three latest AHA protocols.
Journal ArticleDOI

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography

TL;DR: This work discusses the security and privacy requirements of handover authentication protocols for mobile wireless networks and presents a brief review of hand over authentication protocols using the ID-based PKC technique, showing that only one of the recent protocols proposed can satisfy all security and function requirements.
Journal ArticleDOI

An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks

TL;DR: A new anonymous roaming authentication protocol for the Long Term Evolution-Advanced (LTE-A) supported vehicular networks is proposed and proved by using Burrows–Abadi–Needham (BAN) logic.
Journal ArticleDOI

Is 5G Handover Secure and Private? A Survey

TL;DR: Security and privacy requirements in handovers to resist potential attacks are summarized and secure and privacy-preserving handover schemes are reviewed by categorizing them into two scenarios, i.e., vertical handover and horizontal handover.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book ChapterDOI

Use of Elliptic Curves in Cryptography

TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Journal ArticleDOI

LTE-advanced: next-generation wireless broadband technology [Invited Paper]

TL;DR: An overview of the techniques being considered for LTE Release 10 (aka LTEAdvanced) is discussed, which includes bandwidth extension via carrier aggregation to support deployment bandwidths up to 100 MHz, downlink spatial multiplexing including single-cell multi-user multiple-input multiple-output transmission and coordinated multi point transmission, and heterogeneous networks with emphasis on Type 1 and Type 2 relays.
Journal ArticleDOI

Simulating LTE Cellular Systems: An Open-Source Framework

TL;DR: The open-source framework LTE-Sim is presented to provide a complete performance verification of LTE networks and has been conceived to simulate uplink and downlink scheduling strategies in multicell/multiuser environments, taking into account user mobility, radio resource optimization, frequency reuse techniques, the adaptive modulation and coding module, and other aspects that are very relevant to the industrial and scientific communities.
Journal ArticleDOI

VANET security surveys

TL;DR: The various categories of applications in VANETs are introduced, as well as some security requirements, threats and certain architectures are proposed to solve the security problem.
Related Papers (5)