Font Size: a A A

Research On Handover Authentication And Key Agreement Protocol In Heterogeneous Wireless Networks

Posted on:2022-08-24Degree:MasterType:Thesis
Country:ChinaCandidate:S QiuFull Text:PDF
GTID:2518306740451754Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the development of 5G ultra-dense heterogeneous networks,it is difficult for the handover of homogeneous wireless technology to meet handover requirement of 5G,which facilitates mobile terminals to implement handover between different networks to ensure user experience.Since the data needed for the handover is vulnerable in the wireless channel,the attack launched by adversary will consumes network resources and leaks private information of mobile terminals,while even worse it affects legitimate terminals to obtain network services and endangers the security of network systems.Considering limited computing and storage resources and power supply of mobile terminals,and the network quality is easily affected by the wireless network bandwidth,once the connection is interrupted due to excessive delay in the handover process,the network service experience will be affected.Therefore,in order to provide secure and uninterrupted network services to mobile terminals,how to implement handover authentication and key agreement safely and efficiently is an important issue to be solved in 5G ultra-dense heterogeneous wireless networks.In this paper,the research on handover authentication and key agreement protocol in heterogeneous wireless networks includes the following contents.(1)Aiming at the safety and efficiency problems of handover authentication scheme which requires online assistance of HS,a handover scheme based on handover authorization without online assistance of HS is proposed.The handover authorization information generated by the home network server through partial blind signatures realizes user privacy protection and guarantees the authenticity of the parameters which are used in the key negotiation by mobile terminal.The privacy protection strategy of legal/malicious terminals is distinguished,and the tracking of malicious terminals can be realized based on the negotiated information embedded with partial blind signatures.The identity authentication of MT to FS is achieved by verifying whether the key negotiation parameters returned by FS can form a chameleon hash function collision,which results in a reduction of calculation overhead of MT.This scheme realizes message integrity protection through message authentication code,so that it can effectively resist attacks.The security proof under the eCK model and formal analysis by Scyther manifest that the proposed scheme is safe,and the comparative analysis results of similar schemes indicate that the proposed scheme has more superior safety characteristics and system efficiency.(2)For the security threats and efficiency problems of the existing handover authentication and key agreement schemes in heterogeneous wireless network,a safe and efficient handover authentication key agreement protocol is proposed.The scheme is constructed based on a certificateless public key cryptosystem.When mobile terminal handover to a foreign network for the first time,the real identity of the MT is hidden by symmetric encryption,and the legality of the identity and the integrity of the message are carried out simultaneously,in addition,the potential security threats caused by lagging identity authentication are avoided,and the system overhead caused by key conformation is eliminated.The scheme provides comprehensive message integrity protection to the messages,and can resist all means of adversary attacks.Furthermore,considering the re-authentication scenario,in which the user temporary identity and session key are dynamically updated.The formal analysis shows that this scheme is safe,and the comparative analysis with similar schemes manifests that this scheme has no extra overhead and more complete security attributes.
Keywords/Search Tags:heterogeneous wireless network, handover authentication, session key agreement, chameleon hash function, partial blind signature, certificateless public key cryptosystem
PDF Full Text Request
Related items