A trust and privacy preserving handover authentication protocol for wireless networks

Xu Yang, Yuexin Zhang, Joseph K. Liu, Yali Zeng

    Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

    15 Citations (Scopus)


    Various wireless communication technologies have been developed and deployed because of the increasing access requirements. As a result, it brings a great challenge for designing seamless handover authentication protocols in wireless networks, especially in ensuring security and efficiency. The innocent users in wireless networks hope that the Mobile Internet Service Provider can not only provide efficient Internet access, but also protect their privacy. To provide trust and privacy preserving services, in this paper, we propose a new handover authentication protocol for wireless networks. Specifically, the new protocol provides user anonymity and untraceability, and it achieves high efficiency. Compared with other handover authentication protocols, our proposed mechanism achieves outstanding features of security and efficiency.

    Original languageEnglish
    Title of host publication2016 IEEE Trustcom/BigDataSE/ISPA
    Subtitle of host publicationTianjin, China, 23-26 August, 2016, [Proceedings]
    EditorsYang Xiang, Kui Ren, Dengguo Feng
    Place of PublicationPiscataway, NJ
    PublisherIEEE, Institute of Electrical and Electronics Engineers
    Number of pages6
    ISBN (Electronic)9781509032051
    ISBN (Print)9781509032068
    Publication statusPublished - 7 Feb 2017
    EventIEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2016 - Tianjin, China
    Duration: 23 Aug 201626 Aug 2016
    Conference number: 15th
    https://ieeexplore.ieee.org/xpl/conhome/7845250/proceeding (Proceedings)


    ConferenceIEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2016
    Abbreviated titleTrustCom 2016
    Internet address


    • Efficiency
    • Handover authentication
    • Security
    • Trust and privacy preserving
    • Wireless networks

    Cite this