A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications

2020 ◽  
Vol 114 (3) ◽  
pp. 2613-2627
Author(s):  
Guangsong Li ◽  
Yongbin Zeng ◽  
Hui Guang ◽  
Gang Yu
2011 ◽  
Vol 10 (2) ◽  
pp. 431-436 ◽  
Author(s):  
Daojing He ◽  
Jiajun Bu ◽  
Sammy Chan ◽  
Chun Chen ◽  
Mingjian Yin

2013 ◽  
Vol 401-403 ◽  
pp. 1864-1867 ◽  
Author(s):  
Li Ling Cao ◽  
Wan Cheng Ge

The existing Extensible Authentication Protocol (EAP) based handover authentication schemes have show robust security features especially the Qi Jing et al.'s design, which not only meets the essential security requirements in handover authentication but also achieves privacy preservation. However, it still suffers pitfalls in the process of authentication. The main idea of this paper is to extend the work by Qi Jing et al. and particularly focus on the formal analysis using extending BAN logic which is more concise yet practical to use on PKI-based protocols.


Author(s):  
Seunghwan Son ◽  
Joonyoung Lee ◽  
Yohan Park ◽  
Youngho Park ◽  
Ashok Kumar Das

Sign in / Sign up

Export Citation Format

Share Document