57,969 research outputs found
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks
Designing a secure and efficient handover authentication scheme has always
been a concern of cellular networks especially in 4G Long Term Evolution
(LTE) wireless networks. What makes their handover so complex, is the presence of
different types of base stations namely eNodeB (eNB) and Home eNodeB (HeNB).
In addition, they cannot directly communicate with each other. Recently, an efficient
proxy signature-based handover authentication scheme has been suggested by Qui et
al. Despite its better performance and security advantages than previous schemes, it
suffers serious vulnerabilities, namely being prone to DoS attack , eNB impersonation
attack and lack of perfect forward secrecy. In this paper, we propose an improved
handover authentication scheme in LTE wireless networks that resists against
such attacks. Further, we validate the security of the proposed scheme using Real-Or-
Random (ROR) model and ProVerif analysis tool. The results confirm our security
claims of the proposed scheme. In addition, the performance analysis shows that
compared to other schemes, our proposed scheme is more efficient
An Elliptic Curve-based Signcryption Scheme with Forward Secrecy
An elliptic curve-based signcryption scheme is introduced in this paper that
effectively combines the functionalities of digital signature and encryption,
and decreases the computational costs and communication overheads in comparison
with the traditional signature-then-encryption schemes. It simultaneously
provides the attributes of message confidentiality, authentication, integrity,
unforgeability, non-repudiation, public verifiability, and forward secrecy of
message confidentiality. Since it is based on elliptic curves and can use any
fast and secure symmetric algorithm for encrypting messages, it has great
advantages to be used for security establishments in store-and-forward
applications and when dealing with resource-constrained devices.Comment: 13 Pages, 5 Figures, 2 Table
- …