2020
DOI: 10.1109/tifs.2019.2931076
|View full text |Cite
|
Sign up to set email alerts
|

ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications

Abstract: Due to the expectedly higher density of mobile devices and exhaust of radio resources, the fifth generation (5G) mobile networks introduce small cell concept in the radio access technologies, so-called Small Cell Networks (SCNs), to improve radio spectrum utilization. However, this increases the chance of handover due to smaller coverage of a micro base station, i.e., home eNodeB (HeNB) in 5G. Subsequently, the latency will increase as the costs of authenticated key exchange protocol, which ensures entity auth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(21 citation statements)
references
References 51 publications
0
18
0
Order By: Relevance
“…The goal of these schemes is to reduce handover delays and ensure that handover schemes are secure, especially to support user's anonymity. Fan et al [24] designed a handover authentication protocol called ReHand based on symmetric cryptography. In Fan et al's scheme, the long-term key of each UE is shared with the base stations of the same region, and a region key is shared between eNB and HeNBs in the same region.…”
Section: B Fog Computing Architecturementioning
confidence: 99%
“…The goal of these schemes is to reduce handover delays and ensure that handover schemes are secure, especially to support user's anonymity. Fan et al [24] designed a handover authentication protocol called ReHand based on symmetric cryptography. In Fan et al's scheme, the long-term key of each UE is shared with the base stations of the same region, and a region key is shared between eNB and HeNBs in the same region.…”
Section: B Fog Computing Architecturementioning
confidence: 99%
“…Similarly, Fan et al [96] proposed a region-based handover scheme for small cell networks. Quite similar to the aforementioned trust zone, the main idea of this scheme is to build a region containing one eNB and several Home Evolved Node Base Stations (HeNBs).…”
Section: B Security Schemes For Horizontal Handovermentioning
confidence: 99%
“…Many schemes [58], [59], [85], [86], [88], [90], [94], [96], [101]- [103], [105], [106], [116], [118], [120], [125] adopted pseudonym-based mechanism to achieve identity pri-vacy preservation. In order to prevent adversaries from identity tracing, the ME changes its pseudonym every time when it performs handover.…”
Section: Privacy Countermeasures For 5g Handovermentioning
confidence: 99%
“…The proposed mechanisms rely on the concept of reducing messages involved in the authentication procedure with the authentication server. The user anonymity in the handover is considered by Fan et al [73] in their ReHand scheme. Their scheme reduces the communication cost compared with the existing solutions.…”
Section: Secure Mobility Management In 5gmentioning
confidence: 99%