Journal ArticleDOI
Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions
TLDR
A novel handover authentication protocol named PairHand is proposed that uses pairing-based cryptography to secure handover process and to achieve high efficiency, and an efficient batch signature verification scheme is incorporated into PairHand.Abstract:
Seamless handover over multiple access points is highly desirable to mobile nodes, but ensuring security and efficiency of this process is challenging. This paper shows that prior handover authentication schemes incur high communication and computation costs, and are subject to a few security attacks. Further, a novel handover authentication protocol named PairHand is proposed. PairHand uses pairing-based cryptography to secure handover process and to achieve high efficiency. Also, an efficient batch signature verification scheme is incorporated into PairHand. Experiments using our implementation on laptop PCs show that PairHand is feasible in real applications.read more
Citations
More filters
Journal ArticleDOI
Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems
TL;DR: Extensive simulations and analysis show the effectiveness and efficiency of the proposed framework, in which the blockchain structure performs better in term of key transfer time than the structure with a central manager, while the dynamic scheme allows SMs to flexibly fit various traffic levels.
Journal ArticleDOI
5G roadmap
TL;DR: The state-of-the-art and the potentials of these ten enabling technologies are extensively surveyed, and the challenges and limitations for each technology are treated in depth, while the possible solutions are highlighted.
Journal ArticleDOI
Survey on blockchain for Internet of Things
TL;DR: The Blockchain technologies which can potentially address the critical challenges arising from the IoT and hence suit the IoT applications are identified with potential adaptations and enhancements elaborated on the Blockchain consensus protocols and data structures.
Journal ArticleDOI
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
TL;DR: The present study makes the first step towards understanding the underlying evaluation metric for anonymous two-factor authentication, which is believed to facilitate better design of anonymousTwo-factor protocols that offer acceptable trade-offs among usability, security and privacy.
Journal ArticleDOI
Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks
TL;DR: This paper proposes a model permissioned blockchain edge model for smart grid network (PBEM-SGN) to address the two significant issues in smart grid, privacy protections, and energy security, by means of combining blockchain and edge computing techniques.
References
More filters
Book ChapterDOI
Short Signatures from the Weil Pairing
Dan Boneh,Ben Lynn,Hovav Shacham +2 more
TL;DR: A short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves is introduced, designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.
Journal ArticleDOI
Securing vehicular ad hoc networks
Maxim Raya,Jean-Pierre Hubaux +1 more
TL;DR: This paper provides a set of security protocols, it is shown that they protect privacy and it is analyzed their robustness and efficiency, and describes some major design decisions still to be made.
Book ChapterDOI
Perfectly-Secure Key Distribution for Dynamic Conferences
TL;DR: This paper considers the model where interaction is allowed in the common key computation phase, and shows a gap between the models by exhibiting an interactive scheme in which the user's information is only k + t - 1 times the size of the commonKey.
Proceedings ArticleDOI
Securing Vehicular Ad Hoc Networks
Xiaonan Liu,Zhiyi Fang,Lijun Shi +2 more
TL;DR: In this paper, the ITS (intelligent transport system) includes two big function modules: Information processing application system and Road condition information transferring system, which is in charge of the information exchange of the car inside, car to car and car to road.
Journal ArticleDOI
Energy-aware lossless data compression
Kenneth C. Barr,Krste Asanovic +1 more
TL;DR: This work demonstrates that, with several typical compression algorithms, there is a actually a net energy increase when compression is applied before transmission, and suggestions are made to avoid it.
Related Papers (5)
A handover authentication using credentials based on chameleon hashing
Jaeduck Choi,Souhwan Jung +1 more