Cited time in webofscience Cited time in scopus

ReHand: Secure Region-Based Fast Handover with User Anonymity for Small Cell Networks in Mobile Communications

Title
ReHand: Secure Region-Based Fast Handover with User Anonymity for Small Cell Networks in Mobile Communications
Author(s)
Fan, Chun-, IHuang, Jheng-JiaZhong, Min-ZheHsu, Ruei-HauChen, Wen-TsuenLee, Jemin
Issued Date
2020-01
Citation
IEEE Transactions on Information Forensics and Security, v.15, pp.927 - 942
Type
Article
Author Keywords
key exchangeuser anonymityactive revocation5G mobile communicationssmall cell networkhandoverauthentication
Keywords
PRIVACY-PRESERVING AUTHENTICATIONEFFICIENTPROTOCOLSSCHEME5G
ISSN
1556-6013
Abstract
Due to the fact that the higher density of mobile devices is expected, the fifth generation (5G) mobile networks introduce small cell networks (SCNs) to prevent exhausting radio resources. SCNs improve radio spectrum utilization by deploying more base stations (BSs) in the networks. Even though authenticated key exchange (AKE) is still essential to ensure entity authentication and confidentiality in mobile communications. Besides, user anonymity is required to guarantee the footprints of mobile communications being concealed. However, AKE with user anonymity may increase the latency of communications dramatically in total due to several times more frequency in SCNs. The increase of latency will be more serious when an AKE protocol supports user anonymity, where traceability and revocability to users are necessary. Thus, this paper presents a secure region-based handover scheme (ReHand) with user anonymity and fast revocation for SCNs. ReHand greatly reduces the communication latency when user equipments (UEs) roam between small cells within the region of a macro BS, i.e., eNB, and the computation costs due to the employment of symmetry-based cryptographic operations. Compared to the three related prior arts, ReHand dramatically reduces the latency from 82.92% to 99.99% by region-based secure handover. Nevertheless, this paper demonstrates the security of ReHand by theoretically formal proofs. © 2019 IEEE.
URI
http://hdl.handle.net/20.500.11750/10921
DOI
10.1109/TIFS.2019.2931076
Publisher
Institute of Electrical and Electronics Engineers
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Department of Electrical Engineering and Computer Science ISC(Information Security and Communication) Lab 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE