Sunteți pe pagina 1din 10

WWW.MICANSINFOTECH.COM WWW.IEEEPROJECTS-FINALYEARPROJECTS.BLOGSPOT.

IN +91 90036 28940

Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions


ABSTRACT:

Seamless handover over multiple access points is highly desirable to mobile nodes, but ensuring security and efficiency of this process is challenging. This project shows that prior handover authentication schemes incur high communication and computation costs, and are subject to a few security attacks. Further, a novel handover authentication protocol named PairHand is proposed. PairHand uses pairing-based cryptography to secure

handover process and to achieve high efficiency. Also, an efficient batch signature verification scheme is incorporated into PairHand. Experiments using our implementation on laptop PCs show that PairHand is feasible in real applications.

WWW.MICANSINFOTECH.COM WWW.IEEEPROJECTS-FINALYEARPROJECTS.BLOGSPOT.IN +91 90036 28940

Existing System:

All existing handover authentication protocols

are subject to a few security attacks in

two aspects. On the one hand, users are deeply concerned about their privacy-related information such as the identity, position, and roaming route. Unfortunately, in most of the current handover authentication schemes it is commonly assumed that the APs are trustworthy and would keep users privacy-related information confidential.

Existing group signature schemes do provide revocable anonymity, but cannot meet high efficiency. Here we adopt the privacy preserving technique based on Pseudonyms.

Existing handover authentication protocols incur high communication and computation costs in five aspects. The conventional way of performing handover authentication is to let 2 contact AS who acts as a guarantor for vouching that an MN is its legitimate subscriber. This will incur more computation and communication delay, especially AS is often located in a remote location.

All existing handover authentication protocols fail to provide appropriate security and efficiency guarantees. In this case, users are reluctant to accept such mobile service. Thus, it is utterly important to provide an efficient handover authentication protocol for practical wireless networks.

WWW.MICANSINFOTECH.COM WWW.IEEEPROJECTS-FINALYEARPROJECTS.BLOGSPOT.IN +91 90036 28940

Proposed System:
In this project, a novel handover authentication protocol named PairHand is proposed. This project shows that prior handover authentication schemes incur high communication and computation costs, and are subject to a few security attacks.

In this project, we propose a novel handover authentication protocol called PairHand, which uses pairing based cryptography to secure handover process and to reduce the communication and computation overheads of the involved entities.

Also, it only requires two handshakes between an MN and an AP, and does not need to transmit or verify any certificate as in traditional public key cryptosystems. Further, we introduce an efficient batch signature verification scheme, in which each AP can simultaneously verify multiple received signatures.

PairHand uses pairing-based cryptography to secure handover process and to achieve high efficiency. Also, an efficient batch signature verification scheme is incorporated into PairHand.

WWW.MICANSINFOTECH.COM WWW.IEEEPROJECTS-FINALYEARPROJECTS.BLOGSPOT.IN +91 90036 28940

System Specification
Software Requirements Front End/GUI Tool Operating System Language : Microsoft Visual studio 2008 : Windows family : C#.NET

Hardware Specification

Processor RAM Hard Disk Drive Monitor

: Pentium dual core : 1 GB : 80 GB : 17 Color Monitor

WWW.MICANSINFOTECH.COM WWW.IEEEPROJECTS-FINALYEARPROJECTS.BLOGSPOT.IN +91 90036 28940

Module List
Login Request Server Handover Authentication: Batch Authentication: Traffic-Aware Dynamic Routing: Pair hand

Module Description

1. Login: In this module the user can get in to the system by enter the username and password. The user can register them self in the particular Access pointer (AP). Therefore we can easily identify a Mobile Node (MN), where it is resident.

2. Request Server: If the client or a Mobile Node (MN) gets in to the system once, it may access the server through Access pointer (AP). The MN can request any process from the server such download, verify, etc.

3. Handover Authentication: The handover authentication process takes place, when the AP receives a new MN. The AP sends a private key to MN and the MN will respond with message and signature. The AP verifies the signature for authentication.

WWW.MICANSINFOTECH.COM WWW.IEEEPROJECTS-FINALYEARPROJECTS.BLOGSPOT.IN +91 90036 28940

4. Batch Authentication: The batch authentication is the process of verifying information, which is received from the MN to previous AP where MN resident. The authenticated information is checked between the MN and previous AP in new AP. If the authentication is correct, it will allow the MN to continue their status from the server.

5. Traffic-Aware Dynamic Routing: When the n number of packets moves towards the AP parallel, there the traffic may occur. To avoid the traffic during communication establishment the traffic awaredynamic routing technique is provide.

6. Pair hand

A novel handover authentication protocol called PairHand, which uses pairing based cryptography to secure handover process and to reduce the communication and computation overheads of the involved entities. Also, it only requires two handshakes between an MN and an AP, and does not need to transmit or verify any certificate as in traditional public key cryptosystems. Further, we introduce an efficient batch signature verification scheme, in which each AP can simultaneously verify multiple received signatures.

WWW.MICANSINFOTECH.COM WWW.IEEEPROJECTS-FINALYEARPROJECTS.BLOGSPOT.IN +91 90036 28940

Data Flow Diagram

DFD level 0:

Request Client Access Pointer

Response Server

Fig 4.9: User Communicate with Server through Access Pointer

WWW.MICANSINFOTECH.COM WWW.IEEEPROJECTS-FINALYEARPROJECTS.BLOGSPOT.IN +91 90036 28940

DFD level 1:

Access Pointer 1

User

Server

Fig 4.10: The user request the server for communication Through its Resident Access Pointer (AP).

DFD level 2:
Access Pointer 1 verify allow Secret Key User Key+Message+ Signature Provide Access

Access Pointer 2

Move to AP2

Server

Fig 4.11: Process during new AP changed

WWW.MICANSINFOTECH.COM WWW.IEEEPROJECTS-FINALYEARPROJECTS.BLOGSPOT.IN +91 90036 28940

System Architecture:

Handover authentication overview

Figure shows, a typical handover authentication scenario involves three entities: mobile nodes (MNs), access points (APs) and the authentication server (AS). Before entering the network, an MN registers to AS, then subscribes services and connects to an AP for accessing the network. When the MN moves from the current AP (e.g., 1) into a new AP (e.g., 2), handover authentication should be performed at 2. Through handover authentication, AP2 authenticates the MN to identify and reject any access request by an unauthorized user. At the

WWW.MICANSINFOTECH.COM WWW.IEEEPROJECTS-FINALYEARPROJECTS.BLOGSPOT.IN +91 90036 28940

same time, a session key should be established between the MN and 2 to provide confidentiality and integrity of the communication session.

S-ar putea să vă placă și