scispace - formally typeset
Journal ArticleDOI

Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions

TLDR
A novel handover authentication protocol named PairHand is proposed that uses pairing-based cryptography to secure handover process and to achieve high efficiency, and an efficient batch signature verification scheme is incorporated into PairHand.
Abstract
Seamless handover over multiple access points is highly desirable to mobile nodes, but ensuring security and efficiency of this process is challenging. This paper shows that prior handover authentication schemes incur high communication and computation costs, and are subject to a few security attacks. Further, a novel handover authentication protocol named PairHand is proposed. PairHand uses pairing-based cryptography to secure handover process and to achieve high efficiency. Also, an efficient batch signature verification scheme is incorporated into PairHand. Experiments using our implementation on laptop PCs show that PairHand is feasible in real applications.

read more

Citations
More filters
Journal ArticleDOI

Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems

TL;DR: Extensive simulations and analysis show the effectiveness and efficiency of the proposed framework, in which the blockchain structure performs better in term of key transfer time than the structure with a central manager, while the dynamic scheme allows SMs to flexibly fit various traffic levels.
Journal ArticleDOI

5G roadmap

TL;DR: The state-of-the-art and the potentials of these ten enabling technologies are extensively surveyed, and the challenges and limitations for each technology are treated in depth, while the possible solutions are highlighted.
Journal ArticleDOI

Survey on blockchain for Internet of Things

TL;DR: The Blockchain technologies which can potentially address the critical challenges arising from the IoT and hence suit the IoT applications are identified with potential adaptations and enhancements elaborated on the Blockchain consensus protocols and data structures.
Journal ArticleDOI

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

TL;DR: The present study makes the first step towards understanding the underlying evaluation metric for anonymous two-factor authentication, which is believed to facilitate better design of anonymousTwo-factor protocols that offer acceptable trade-offs among usability, security and privacy.
Journal ArticleDOI

Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks

TL;DR: This paper proposes a model permissioned blockchain edge model for smart grid network (PBEM-SGN) to address the two significant issues in smart grid, privacy protections, and energy security, by means of combining blockchain and edge computing techniques.
References
More filters
Book ChapterDOI

Short Signatures from the Weil Pairing

TL;DR: A short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves is introduced, designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.
Journal ArticleDOI

Securing vehicular ad hoc networks

TL;DR: This paper provides a set of security protocols, it is shown that they protect privacy and it is analyzed their robustness and efficiency, and describes some major design decisions still to be made.
Book ChapterDOI

Perfectly-Secure Key Distribution for Dynamic Conferences

TL;DR: This paper considers the model where interaction is allowed in the common key computation phase, and shows a gap between the models by exhibiting an interactive scheme in which the user's information is only k + t - 1 times the size of the commonKey.
Proceedings ArticleDOI

Securing Vehicular Ad Hoc Networks

TL;DR: In this paper, the ITS (intelligent transport system) includes two big function modules: Information processing application system and Road condition information transferring system, which is in charge of the information exchange of the car inside, car to car and car to road.
Journal ArticleDOI

Energy-aware lossless data compression

TL;DR: This work demonstrates that, with several typical compression algorithms, there is a actually a net energy increase when compression is applied before transmission, and suggestions are made to avoid it.
Related Papers (5)