Premium
Efficient and robust identity‐based handoff authentication for EAP‐based wireless networks
Author(s) -
Han Qi,
Zhang Yinghui,
Chen Xiaofeng,
Li Hui,
Quan Jiaxiang
Publication year - 2013
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.3024
Subject(s) - computer science , authentication protocol , computer network , authentication (law) , handover , node (physics) , lightweight extensible authentication protocol , computer security , authentication server , cryptography , hash function , identity (music) , data authentication algorithm , wireless , scheme (mathematics) , telecommunications , engineering , mathematical analysis , physics , mathematics , structural engineering , acoustics
SUMMARY The Extensible Authentication Protocol (EAP) framework aims to realize a flexible authentication for wireless networks. However, a full EAP authentication needs several round trips between a mobile node and the EAP server, and hence is unacceptable in a process of handoff authentication because of inefficient performance. Considering the advantage of the identity‐based cryptography, it is attractive to realize handoff authentication efficiently in the identity‐based setting. In this work, we propose a new identity‐based handoff authentication scheme in which a special double‐trapdoor chameleon hash function is used. Compared with the existing identity‐based handoff authentication construction, the main advantage of the proposed scheme eliminates the assumption that the private key generator is fully trusted. Besides, the detailed security analysis shows that the proposed scheme not only satisfies robust security properties but also enjoys desirable efficiency for the real‐world applications. Copyright © 2013 John Wiley & Sons, Ltd.