scispace - formally typeset
Journal ArticleDOI

Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks

TLDR
This paper proposes a novel privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing to fit in with all of the mobility scenarios in the LTE/LTE-A networks, which is called Nframe.
Abstract
Seamless handover between the evolved universal terrestrial radio access network and other access networks is highly desirable to mobile equipments in the long term evolution (LTE) or LTE-Advanced (LTE-A) networks, but ensuring security and efficiency of this process is challenging. In this paper, we propose a novel privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing to fit in with all of the mobility scenarios in the LTE/LTE-A networks, which is called Nframe. To the best of our knowledge, Nframe is the first to support protecting users’ privacy with non-frameability in the handover process. Moreover, Nframe uses pairing-free identity based cryptographic method to secure handover process and to achieve high efficiency. The formal verification by the AVISPA tool shows that Nframe is secure against various malicious attacks and the simulation result indicates that it outperforms the existing schemes in terms of computation and communication cost.

read more

Citations
More filters
Journal ArticleDOI

Security for 4G and 5G cellular networks

TL;DR: A comprehensive survey of authentication and privacy-preserving schemes for 4G and 5G cellular networks can be found in this paper, where the authors provide a taxonomy and comparison of authentication schemes in terms of tables.
Journal ArticleDOI

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey

TL;DR: In this paper, the state of the art of privacy-preserving schemes for ad hoc social networks including mobile social networks (MSNs) and vehicular social network (VSNs) is reviewed.
Journal ArticleDOI

Robust and Universal Seamless Handover Authentication in 5G HetNets

TL;DR: Comprehensive performance evaluation and comparisons show that RUSH outperforms other schemes in both computation and communication efficiencies, and formal security proofs indicate that RRush resists various attacks.
Posted Content

Privacy-preserving schemes for Ad Hoc Social Networks: A survey

TL;DR: This survey selects and examines in-detail 33 privacy-preserving schemes developed for or applied in the context of ad hoc social networks and surveys privacy preservation models including location privacy, identity privacy, anonymity, traceability, interest privacy, backward privacy, and content oriented privacy.
Journal ArticleDOI

ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms

TL;DR: This paper presents the first many-to-one attestation scheme for device swarms, which reduces the possibility of single point of failure verifier and can significantly reduce the attestation time and has a better performance in the energy consumption comparing with list-based attestation schemes.
References
More filters
Journal ArticleDOI

A Survey on Security Aspects for LTE and LTE-A Networks

TL;DR: An overview of the security functionality of the LTE and LTE-A networks and the security vulnerabilities existing in the architecture and the design are explored and the potential research issues for the future research works are shown.
Journal ArticleDOI

Authentication handover and privacy protection in 5G hetnets using software-defined networking

TL;DR: The objective is to simplify authentication handover by global management of 5G HetNets through sharing of userdependent security context information among related access points and demonstrate that SDN-enabled security solutions are highly efficient through its centralized control capability, which is essential for delay-constrained 5G communications.
Journal ArticleDOI

Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions

TL;DR: A novel handover authentication protocol named PairHand is proposed that uses pairing-based cryptography to secure handover process and to achieve high efficiency, and an efficient batch signature verification scheme is incorporated into PairHand.
Journal ArticleDOI

Lightweight and provably secure user authentication with anonymity for the global mobility network

TL;DR: A lightweight and provably secure user authentication scheme with anonymity for the GLOMONET that uses only symmetric cryptographic and hash operation primitives for secure authentication and can defend smart card security breaches.

EAP Extensions for EAP Re-authentication Protocol (ERP)

TL;DR: This document specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an E AP re-Authentication server through any authenticator.
Related Papers (5)