Journal ArticleDOI
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks
TLDR
This paper proposes a novel privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing to fit in with all of the mobility scenarios in the LTE/LTE-A networks, which is called Nframe.Abstract:
Seamless handover between the evolved universal terrestrial radio access network and other access networks is highly desirable to mobile equipments in the long term evolution (LTE) or LTE-Advanced (LTE-A) networks, but ensuring security and efficiency of this process is challenging. In this paper, we propose a novel privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing to fit in with all of the mobility scenarios in the LTE/LTE-A networks, which is called Nframe. To the best of our knowledge, Nframe is the first to support protecting users’ privacy with non-frameability in the handover process. Moreover, Nframe uses pairing-free identity based cryptographic method to secure handover process and to achieve high efficiency. The formal verification by the AVISPA tool shows that Nframe is secure against various malicious attacks and the simulation result indicates that it outperforms the existing schemes in terms of computation and communication cost.read more
Citations
More filters
Journal ArticleDOI
Security for 4G and 5G cellular networks
Mohamed Amine Ferrag,Leandros A. Maglaras,Antonios Argyriou,Dimitrios Kosmanos,Helge Janicke +4 more
TL;DR: A comprehensive survey of authentication and privacy-preserving schemes for 4G and 5G cellular networks can be found in this paper, where the authors provide a taxonomy and comparison of authentication schemes in terms of tables.
Journal ArticleDOI
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
TL;DR: In this paper, the state of the art of privacy-preserving schemes for ad hoc social networks including mobile social networks (MSNs) and vehicular social network (VSNs) is reviewed.
Journal ArticleDOI
Robust and Universal Seamless Handover Authentication in 5G HetNets
TL;DR: Comprehensive performance evaluation and comparisons show that RUSH outperforms other schemes in both computation and communication efficiencies, and formal security proofs indicate that RRush resists various attacks.
Posted Content
Privacy-preserving schemes for Ad Hoc Social Networks: A survey
TL;DR: This survey selects and examines in-detail 33 privacy-preserving schemes developed for or applied in the context of ad hoc social networks and surveys privacy preservation models including location privacy, identity privacy, anonymity, traceability, interest privacy, backward privacy, and content oriented privacy.
Journal ArticleDOI
ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms
TL;DR: This paper presents the first many-to-one attestation scheme for device swarms, which reduces the possibility of single point of failure verifier and can significantly reduce the attestation time and has a better performance in the energy consumption comparing with list-based attestation schemes.
References
More filters
Journal ArticleDOI
A Survey on Security Aspects for LTE and LTE-A Networks
TL;DR: An overview of the security functionality of the LTE and LTE-A networks and the security vulnerabilities existing in the architecture and the design are explored and the potential research issues for the future research works are shown.
Journal ArticleDOI
Authentication handover and privacy protection in 5G hetnets using software-defined networking
Xiaoyu Duan,Xianbin Wang +1 more
TL;DR: The objective is to simplify authentication handover by global management of 5G HetNets through sharing of userdependent security context information among related access points and demonstrate that SDN-enabled security solutions are highly efficient through its centralized control capability, which is essential for delay-constrained 5G communications.
Journal ArticleDOI
Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions
TL;DR: A novel handover authentication protocol named PairHand is proposed that uses pairing-based cryptography to secure handover process and to achieve high efficiency, and an efficient batch signature verification scheme is incorporated into PairHand.
Journal ArticleDOI
Lightweight and provably secure user authentication with anonymity for the global mobility network
TL;DR: A lightweight and provably secure user authentication scheme with anonymity for the GLOMONET that uses only symmetric cryptographic and hash operation primitives for secure authentication and can defend smart card security breaches.
EAP Extensions for EAP Re-authentication Protocol (ERP)
TL;DR: This document specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an E AP re-Authentication server through any authenticator.
Related Papers (5)
A simple and robust handover authentication between HeNB and eNB in LTE networks
Authentication handover and privacy protection in 5G hetnets using software-defined networking
Xiaoyu Duan,Xianbin Wang +1 more