Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions
Seamless handover over multiple access points is highly desirable to mobile nodes, but ensuring security and efficiency of this process is challenging. This paper shows that prior handover authentication schemes incur high communication and computation costs, and are subject to a few security attack...
Saved in:
Published in | IEEE transactions on wireless communications Vol. 11; no. 1; pp. 48 - 53 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York, NY
IEEE
01.01.2012
Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1536-1276 1558-2248 |
DOI | 10.1109/TWC.2011.110811.111240 |
Cover
Abstract | Seamless handover over multiple access points is highly desirable to mobile nodes, but ensuring security and efficiency of this process is challenging. This paper shows that prior handover authentication schemes incur high communication and computation costs, and are subject to a few security attacks. Further, a novel handover authentication protocol named PairHand is proposed. PairHand uses pairing-based cryptography to secure handover process and to achieve high efficiency. Also, an efficient batch signature verification scheme is incorporated into PairHand. Experiments using our implementation on laptop PCs show that PairHand is feasible in real applications. |
---|---|
AbstractList | Seamless handover over multiple access points is highly desirable to mobile nodes, but ensuring security and efficiency of this process is challenging. This paper shows that prior handover authentication schemes incur high communication and computation costs, and are subject to a few security attacks. Further, a novel handover authentication protocol named PairHand is proposed. PairHand uses pairing-based cryptography to secure handover process and to achieve high efficiency. Also, an efficient batch signature verification scheme is incorporated into PairHand. Experiments using our implementation on laptop PCs show that PairHand is feasible in real applications. |
Author | Chan, Sammy Daojing He Chun Chen Jiajun Bu |
Author_xml | – sequence: 1 surname: Daojing He fullname: Daojing He email: hedaojinghit@gmail.com organization: Coll. of Comput. Sci., Zhejiang Univ., Hangzhou, China – sequence: 2 surname: Chun Chen fullname: Chun Chen organization: Coll. of Comput. Sci., Zhejiang Univ., Hangzhou, China – sequence: 3 givenname: Sammy surname: Chan fullname: Chan, Sammy email: eeschan@cityu.edu.hk organization: Dept. of Electron. Eng., City Univ. of Hong Kong, Hong Kong, China – sequence: 4 surname: Jiajun Bu fullname: Jiajun Bu organization: Coll. of Comput. Sci., Zhejiang Univ., Hangzhou, China |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=25594765$$DView record in Pascal Francis |
BookMark | eNqFkU1L5jAUhcOgMPrqLxCGIgizqZObNmkKbpwXv0BQUHEZrunNTKSmmrQD8-9Nrc7CzazuB8-5Cedss40wBGLsG_BDAN7-uL1fHwoOME_6rYCo-Re2BVLqUohab8x9pUoQjfrKtlN65BwaJeUWu74hO0UqMHTFiXPeegpjcZ7H4Q_F4ngaf-eFtzj6IRQ_MVFXzI3vfSCMxTX66MOv4nQKdkbSDtt02Cfafa8rdnd6crs-Ly-vzi7Wx5elrZQcS4Wu7lp0CFgjgq4q7qBqOJdK2k4oQbpVXLmG4KGjStbYcRSdEsJxTfqhWrHvy93nOLxMlEbz5JOlvsdAw5QMqAZqAF3LjO5_Qh-HKYb8O9NCI2Xb8Bk6eIcwWexdxGB9Ms_RP2H8a0TG6mxZ5o4WzsYhpUjOWD--uTNG9L0BbuZUTE7FzKmYJRWzpJLl6pP844X_CvcWoSeifyLFdVNl814BCCCZ9Q |
CODEN | ITWCAX |
CitedBy_id | crossref_primary_10_1109_TVT_2022_3176496 crossref_primary_10_1007_s11277_017_4688_z crossref_primary_10_1109_TDSC_2022_3198723 crossref_primary_10_1007_s11276_014_0881_0 crossref_primary_10_1007_s10586_017_1549_1 crossref_primary_10_1016_j_adhoc_2018_07_030 crossref_primary_10_1007_s11277_014_2029_z crossref_primary_10_1007_s12083_018_0703_8 crossref_primary_10_1016_j_comnet_2021_107989 crossref_primary_10_1109_TMC_2013_134 crossref_primary_10_1109_TVT_2021_3120420 crossref_primary_10_1109_JIOT_2023_3262933 crossref_primary_10_1109_MCOM_2015_7180512 crossref_primary_10_3390_su15075934 crossref_primary_10_1109_JSYST_2018_2883349 crossref_primary_10_1016_j_comnet_2016_06_010 crossref_primary_10_1016_j_compeleceng_2017_06_002 crossref_primary_10_26634_jmt_1_2_3172 crossref_primary_10_1109_JIOT_2023_3269150 crossref_primary_10_1007_s11704_013_2305_1 crossref_primary_10_1109_TVT_2022_3163960 crossref_primary_10_1016_j_ins_2022_12_051 crossref_primary_10_1109_TC_2015_2485225 crossref_primary_10_1002_spy2_352 crossref_primary_10_1109_ACCESS_2017_2789301 crossref_primary_10_1109_TWC_2024_3354064 crossref_primary_10_1109_ACCESS_2024_3434532 crossref_primary_10_1109_JIOT_2019_2904303 crossref_primary_10_1007_s11277_015_3139_y crossref_primary_10_1080_19393555_2017_1385116 crossref_primary_10_3390_s140711379 crossref_primary_10_1080_17517575_2023_2243616 crossref_primary_10_1109_ACCESS_2016_2565198 crossref_primary_10_1007_s12243_018_0668_x crossref_primary_10_1016_j_cose_2021_102358 crossref_primary_10_1007_s11277_013_1246_1 crossref_primary_10_1109_MWC_2017_1600187WC crossref_primary_10_1007_s11277_017_5156_5 crossref_primary_10_1109_ACCESS_2019_2912870 crossref_primary_10_1109_JSYST_2016_2585681 crossref_primary_10_1016_j_jnca_2022_103435 crossref_primary_10_1016_j_phycom_2018_05_001 crossref_primary_10_1109_TDSC_2014_2355850 crossref_primary_10_1109_TITS_2023_3249833 crossref_primary_10_1109_LCOMM_2013_052013_130642 crossref_primary_10_1155_2022_2500377 crossref_primary_10_1088_1742_6596_910_1_012043 crossref_primary_10_4018_IJIDE_2018070102 crossref_primary_10_1007_s11276_016_1277_0 crossref_primary_10_1109_TIFS_2017_2756567 crossref_primary_10_1007_s11042_017_5360_z crossref_primary_10_1109_JIOT_2019_2902907 crossref_primary_10_1109_JIOT_2017_2740569 crossref_primary_10_1109_TIV_2023_3307699 crossref_primary_10_1109_LCOMM_2012_061912_120941 crossref_primary_10_1007_s11432_016_0161_2 crossref_primary_10_1109_JIOT_2021_3068463 crossref_primary_10_1109_JIOT_2019_2922979 crossref_primary_10_1109_TNSM_2022_3164549 crossref_primary_10_1109_TDSC_2019_2927664 crossref_primary_10_1007_s11277_014_1930_9 crossref_primary_10_1016_j_jpdc_2021_06_007 crossref_primary_10_1016_j_sysarc_2021_102024 crossref_primary_10_3390_app10186268 crossref_primary_10_1155_2016_5760245 crossref_primary_10_1016_j_jnca_2017_10_017 crossref_primary_10_1109_ACCESS_2018_2879961 crossref_primary_10_1016_j_comcom_2023_09_012 crossref_primary_10_1109_MNET_2018_1800193 crossref_primary_10_1109_TCSII_2018_2861922 crossref_primary_10_1109_TCSI_2015_2407431 crossref_primary_10_1109_TNET_2021_3062766 crossref_primary_10_1109_MCOM_2013_6461199 crossref_primary_10_1109_LCOMM_2017_2786228 crossref_primary_10_1109_MCOM_2015_7081072 crossref_primary_10_1016_j_adhoc_2016_02_011 crossref_primary_10_3390_sym12020287 crossref_primary_10_1109_MNET_2015_7113232 crossref_primary_10_1016_j_compeleceng_2020_106555 crossref_primary_10_1007_s12652_018_1131_6 crossref_primary_10_1109_TVT_2017_2652484 crossref_primary_10_1109_ACCESS_2020_2995240 crossref_primary_10_1007_s11432_015_5303_0 crossref_primary_10_1109_TNSE_2022_3205443 crossref_primary_10_1109_JIOT_2024_3486044 crossref_primary_10_1002_cpe_4706 crossref_primary_10_1016_j_comnet_2014_07_010 crossref_primary_10_1109_MIS_2013_105 crossref_primary_10_1016_j_comnet_2016_12_013 crossref_primary_10_1109_TIFS_2019_2931076 crossref_primary_10_1109_TNSM_2020_3042526 crossref_primary_10_1002_dac_2847 crossref_primary_10_1016_j_phycom_2018_07_015 crossref_primary_10_1109_JSYST_2019_2932807 crossref_primary_10_1016_j_aej_2025_01_051 crossref_primary_10_1016_j_pmcj_2019_101083 crossref_primary_10_1007_s11276_020_02368_2 crossref_primary_10_3390_s17061446 crossref_primary_10_1049_iet_com_2018_5405 crossref_primary_10_1109_TII_2024_3452758 crossref_primary_10_1007_s11235_018_0446_0 crossref_primary_10_1109_TIFS_2024_3422790 crossref_primary_10_1002_cpe_6623 crossref_primary_10_1186_s13638_018_1217_z crossref_primary_10_1007_s11277_020_07492_y crossref_primary_10_1109_TSG_2021_3102156 crossref_primary_10_1109_JSYST_2015_2416396 crossref_primary_10_1007_s00521_023_08540_x crossref_primary_10_1109_JSEN_2021_3097172 crossref_primary_10_1109_TDSC_2019_2963191 crossref_primary_10_1109_MCOM_2016_7498103 crossref_primary_10_1109_TNSE_2021_3093435 crossref_primary_10_1002_sec_1241 crossref_primary_10_4236_jis_2017_81006 |
Cites_doi | 10.3233/JCS-2007-15103 10.1109/LCOMM.2010.01.091607 10.1109/TWC.2010.120610.101018 10.1016/j.csi.2007.10.007 10.1007/3-540-45682-1_30 10.1093/ietcom/e91-b.2.605 10.1016/j.comcom.2010.02.031 10.1016/j.comcom.2008.11.032 10.1016/j.csi.2008.11.002 10.1109/ICC.2007.263 10.1145/1151690.1151692 10.1109/TWC.2010.01.081219 |
ContentType | Journal Article |
Copyright | 2015 INIST-CNRS Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2012 |
Copyright_xml | – notice: 2015 INIST-CNRS – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2012 |
DBID | 97E RIA RIE AAYXX CITATION IQODW 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
DOI | 10.1109/TWC.2011.110811.111240 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef Pascal-Francis Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Technology Research Database Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Applied Sciences |
EISSN | 1558-2248 |
EndPage | 53 |
ExternalDocumentID | 2569178871 25594765 10_1109_TWC_2011_110811_111240 6087383 |
Genre | orig-research |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS AAYXX CITATION IQODW RIG 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
ID | FETCH-LOGICAL-c365t-6af4d9afa1a4aa18330f13700565cd262e89606f7e1bde354ad0a2d622f08e8b3 |
IEDL.DBID | RIE |
ISSN | 1536-1276 |
IngestDate | Sun Sep 28 02:56:32 EDT 2025 Mon Jun 30 10:12:22 EDT 2025 Mon Jul 21 09:14:46 EDT 2025 Wed Oct 01 02:20:41 EDT 2025 Thu Apr 24 22:56:33 EDT 2025 Wed Aug 27 02:52:43 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Performance evaluation Laptop computer Mobile radiocommunication Private life Multiple access efficiency handover authentication Wireless telecommunication privacy Pattern recognition Implementation Handwriting recognition security Wireless networks Authentication Batch process Security of data Handover Wireless network Access protocol Handwritten character recognition Cryptography |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html CC BY 4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c365t-6af4d9afa1a4aa18330f13700565cd262e89606f7e1bde354ad0a2d622f08e8b3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
PQID | 917559705 |
PQPubID | 105736 |
PageCount | 6 |
ParticipantIDs | proquest_miscellaneous_1671411845 crossref_citationtrail_10_1109_TWC_2011_110811_111240 pascalfrancis_primary_25594765 ieee_primary_6087383 crossref_primary_10_1109_TWC_2011_110811_111240 proquest_journals_917559705 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2012-January 2012-01-00 2012 20120101 |
PublicationDateYYYYMMDD | 2012-01-01 |
PublicationDate_xml | – month: 01 year: 2012 text: 2012-January |
PublicationDecade | 2010 |
PublicationPlace | New York, NY |
PublicationPlace_xml | – name: New York, NY – name: New York |
PublicationTitle | IEEE transactions on wireless communications |
PublicationTitleAbbrev | TWC |
PublicationYear | 2012 |
Publisher | IEEE Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 blundo (ref17) 0 ref11 ref10 (ref2) 2002 (ref14) 2006 choi (ref9) 2009 ref8 raya (ref16) 2007; 15 ref7 ref4 ref3 (ref1) 1993 ref6 ref5 boneh (ref15) 0; 2248 scott (ref18) 0 |
References_xml | – volume: 15 start-page: 39 year: 2007 ident: ref16 article-title: Securing vehicular ad hoc networks publication-title: J Computer Security doi: 10.3233/JCS-2007-15103 – ident: ref10 doi: 10.1109/LCOMM.2010.01.091607 – ident: ref12 doi: 10.1109/TWC.2010.120610.101018 – ident: ref4 doi: 10.1016/j.csi.2007.10.007 – start-page: 291 year: 2009 ident: ref9 article-title: A fast and efficient handover authentication achieving conditional privacy in V2I networks publication-title: LNCS 5764 – volume: 2248 start-page: 514 year: 0 ident: ref15 article-title: Short signatures from the weil pairing publication-title: Proc ASIACRYPT 2001 doi: 10.1007/3-540-45682-1_30 – ident: ref7 doi: 10.1093/ietcom/e91-b.2.605 – ident: ref6 doi: 10.1016/j.comcom.2010.02.031 – year: 2002 ident: ref2 article-title: 3rd Generation Partnership Project, 3GPP Specification: 3GPP TS 33.102, 3G Security, Security Architecture – year: 0 ident: ref18 – ident: ref3 doi: 10.1016/j.comcom.2008.11.032 – ident: ref5 doi: 10.1016/j.csi.2008.11.002 – ident: ref8 doi: 10.1109/ICC.2007.263 – ident: ref13 doi: 10.1145/1151690.1151692 – start-page: 471 year: 0 ident: ref17 article-title: Perfectly-secure key distribution for dynamic conferences publication-title: Advances in Cryptology - CRYPTO 1992 – year: 1993 ident: ref1 article-title: European Telecommunications Standards Institute (ETSI), GSM 02.09: Security Aspects – year: 2006 ident: ref14 article-title: U.S. Department of Transportation, National Highway Traffic Safety Adminstration, Vehicle Safety Communications Project – ident: ref11 doi: 10.1109/TWC.2010.01.081219 |
SSID | ssj0017655 |
Score | 2.4473786 |
Snippet | Seamless handover over multiple access points is highly desirable to mobile nodes, but ensuring security and efficiency of this process is challenging. This... |
SourceID | proquest pascalfrancis crossref ieee |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 48 |
SubjectTerms | Access methods and protocols, osi model Applied sciences Authentication Communication system security Computer crime Cryptography efficiency Exact sciences and technology handover authentication Information, signal and communications theory Laptop Manganese Mathematical analysis Multiple access Pattern recognition Privacy Protocols Security Signal and communications theory Signal processing Signatures Systems, networks and services of telecommunications Telecommunications Telecommunications and information theory Teleprocessing networks. Isdn Transmission and modulation (techniques and equipments) Wireless communication Wireless networks |
Title | Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions |
URI | https://ieeexplore.ieee.org/document/6087383 https://www.proquest.com/docview/917559705 https://www.proquest.com/docview/1671411845 |
Volume | 11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-2248 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0017655 issn: 1536-1276 databaseCode: RIE dateStart: 20020101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjR3LbtQwcNT2RA9QaCuW0spIHMlunDi2c6RVVyukoh5a0Zvl-CFVoCzq7l74embsbERpJTjFkWPH8cxkHp4HwMfoeYdc1RUxhqoQ0rUFSvmyaHXklbK1qjnFDl99lYtb8eWuuduBT2MsTAghOZ-FKTXTWb5fug2Zymay1Ao1ql3YVarNsVrjiYGSqcIpEjDVlVFyiAbmZTu7-XaRc3WSy3u6IFMrHzGiVFmF_CLtCrcm5poWT37PiefMX8HVdrXZ1eT7dLPupu7XX4kc__dzDuDlIHyyzxlbXsNO6N_A_h8pCQ_hOhngA7O9Z5cpvQTOwRZ4S76ejCxq5F-UDX3sHHmgZ9S4J3HVPrBre08TsTnyy4TSR3A7v7y5WBRD1YXC1bJZF9JG4VsbLbfCWqT4uoy8VpQztHG-klXQpPVEFXjnQ90I60tbeVlVsdRBd_Ux7PXLPrwFhmgQPAoFUVKafq91ECSBahQpgtNOTqDZgsC4ISU5Vcb4YZJqUrYGQWcIdCaDzmTQTWA2jvuZk3L8c8Qh7f_49LD1Ezh7BPGxnxQtgSg1gZMtCpiBuFcGNVzSw0rs_TD2IlXSUYvtw3KzMlwqLlB3E8275998Ai9wlVU25ryHvfXDJpyieLPuzhJe_wbo6PL7 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjR1Nb9Mw9GmMA3DYgIEog2EkjqSNE8d2jmNaVWCddujEbpYT29I0lKK1vfDrec9OIwaT4BRHjh3H7728D78PgA_B8Qa5apuF4ItMyLbOUMqXWa0DL5QtVckpdnh-LmeX4stVdbUDH4dYGO99dD7zY2rGs3y3bDdkKpvIXCvUqB7Awwq1CpWitYYzAyVjjVMkYaoso2QfD8zzerL4dpKydZLTe7wgW8vvsKJYW4U8I-0KNyekqhZ__aAj15nuw3y73uRscjPerJtx-_OPVI7_-0FPYa8XP9lxwpdnsOO75_Dkt6SEB3ARTfCe2c6x05hgAudgM7wlb09GNjXyMEqmPvYJuaBj1LgmgdXesgt7TROxKXLMiNQv4HJ6ujiZZX3dhawtZbXOpA3C1TZYboW1SPNlHnipKGto1bpCFl6T3hOU543zZSWsy23hZFGEXHvdlC9ht1t2_hUwRATvUCwIkhL1O629IBlUo1DhW93KEVRbEJi2T0pOtTG-m6ic5LVB0BkCnUmgMwl0I5gM436ktBz_HHFA-z883W_9CI7uQHzoJ1VLIEqN4HCLAqYn75VBHZc0sRx73w-9SJd02GI7v9ysDJeKC9TeRPX6_je_g0ezxfzMnH0-_3oIj3HFRTLtvIHd9e3Gv0VhZ90cRRz_BdRX9kw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+and+Efficient+Handover+Authentication+Based+on+Bilinear+Pairing+Functions&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=DAOJING+HE&rft.au=CHUN+CHEN&rft.au=CHAN%2C+Sammy&rft.au=JIAJUN+BU&rft.date=2012&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=1536-1276&rft.volume=11&rft.issue=1&rft.spage=48&rft.epage=53&rft_id=info:doi/10.1109%2FTWC.2011.110811.111240&rft.externalDBID=n%2Fa&rft.externalDocID=25594765 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon |