{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:11:40Z","timestamp":1763017900563,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,7,30]],"date-time":"2018-07-30T00:00:00Z","timestamp":1532908800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11277-018-5912-1","type":"journal-article","created":{"date-parts":[[2018,7,30]],"date-time":"2018-07-30T12:51:53Z","timestamp":1532955113000},"page":"2317-2352","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Proxy Signature Based Efficient and Robust Handover AKA Protocol for LTE\/LTE-A Networks"],"prefix":"10.1007","volume":"103","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9915-3183","authenticated-orcid":false,"given":"Shubham","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Balu L.","family":"Parne","sequence":"additional","affiliation":[]},{"given":"Narendra S.","family":"Chaudhari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,30]]},"reference":[{"key":"5912_CR1","unstructured":"Network EUTRA. (2011). 3rd generation partnership project. Technical specification group services and system aspects. General packet radio service (GPRS) enhancements for evolved universal terrestrial radio access network (E-UTRA) access."},{"issue":"2","key":"5912_CR2","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/s11277-014-2029-z","volume":"80","author":"G Li","year":"2015","unstructured":"Li, G., Jiang, Q., Wei, F., & Ma, C. (2015). A new privacy-aware handover authentication scheme for wireless networks. Wireless Personal Communications, 80(2), 581\u2013589.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"5912_CR3","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.2009.4907406","volume":"47","author":"D Ast\u00e9ly","year":"2009","unstructured":"Ast\u00e9ly, D., Dahlman, E., Furusk\u00e4r, A., Jading, Y., Lindstr\u00f6m, M., & Parkvall, S. (2009). LTE: The evolution of mobile broadband. IEEE Communications Magazine, 47(4), 44\u201351.","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"5912_CR4","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOM.2009.4785384","volume":"47","author":"C Sankaran","year":"2009","unstructured":"Sankaran, C. (2009). Network access security in next-generation 3GPP systems: A tutorial. IEEE Communications Magazine, 47(2), 84\u201391.","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"5912_CR5","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/s11277-008-9627-6","volume":"52","author":"H Oh","year":"2010","unstructured":"Oh, H., Yoo, K., Na, J., & Ck, Kim. (2010). A robust seamless handover scheme for the support of multimedia services in heterogeneous emerging wireless networks. Wireless Personal Communications, 52(3), 593\u2013613.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"5912_CR6","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/s11277-016-3352-3","volume":"93","author":"Y Xie","year":"2017","unstructured":"Xie, Y., Wu, L., Kumar, N., & Shen, J. (2017). Analysis and improvement of a privacy-aware handover authentication scheme for wireless network. Wireless Personal Communications, 93(2), 523\u2013541.","journal-title":"Wireless Personal Communications"},{"key":"5912_CR7","unstructured":"3GPP. (Jun 2012). Evolved universal terrestrial radio access (E-UTRA) and evolved universal terrestrial radio access network (EUTRAN), overall description. Sophia-Antipolis Cedex, France, 3GPP TS 36300 V1120."},{"key":"5912_CR8","unstructured":"3GPP. (June 2012). 3rd generation partnership project; technical specification group services and system aspects; service requirements for the evolved packet system (EPS) (Rel 12). 3GPP TS 22278 V1210."},{"key":"5912_CR9","unstructured":"3GPP. (Sepember 2012). 3rd generation partnership project; technical specification group core network and terminals; access to the 3GPP evolved packet core (EPC) via non-3GPP access networks (Rel 11). 3GPP TS 24302 V1140."},{"key":"5912_CR10","unstructured":"Lucent, A. (2009). The LTE network architecturea comprehensive tutorial. Strategic Whitepaper."},{"key":"5912_CR11","unstructured":"3GPP. (September 2011). 3rd generation partnership project; technical specification group services and system aspects. General packet radio service (GPRS) enhancements for evolved universal terrestrial radio access network (E-UTRAN) access. (Rel 10). 3GPP TS 23401 V1050."},{"key":"5912_CR12","unstructured":"3GPP. (June 2011). 3rd generation partnership project; technical specification group radio access network. Evolved universal terrestrial radio access (E-UTRA) and evolved universal terrestrial radio access network (E-UTRA). Overall description (Rel 10). 3GPP TS 36300 V1040."},{"issue":"1","key":"5912_CR13","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/SURV.2013.041513.00174","volume":"16","author":"J Cao","year":"2014","unstructured":"Cao, J., Ma, M., Li, H., Zhang, Y., & Luo, Z. (2014). A survey on security aspects for lte and lTE\u2014A networks. IEEE Communications Surveys & Tutorials, 16(1), 283\u2013302.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"16","key":"5912_CR14","doi-asserted-by":"publisher","first-page":"1907","DOI":"10.1016\/j.comcom.2010.07.002","volume":"33","author":"D Forsberg","year":"2010","unstructured":"Forsberg, D. (2010). LTE key management analysis with session keys context. Computer Communications, 33(16), 1907\u20131915.","journal-title":"Computer Communications"},{"key":"5912_CR15","unstructured":"3GPP. (June 2011). 3rd generation partnership project; technical specification group service and system aspects. 3GPP system architecture evolution (SAE). Security architecture. (Rel 11). 3GPP TS 33401 V1101."},{"key":"5912_CR16","doi-asserted-by":"crossref","unstructured":"Boh\u00e1k, A., Butty\u00e1n, L., & D\u00f3ra, L. (2007). An authentication scheme for fast handover between wifi access points. In Proceedings of ACM wireless internet conference (WICON).","DOI":"10.4108\/wicon.2007.2282"},{"key":"5912_CR17","unstructured":"Hong, K., Jung, S., & Wu, S. F. (2005). A hash-chain based authentication scheme for fast handover in wireless network. In International workshop on information security applications (pp. 96\u2013107). Springer."},{"key":"5912_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lu, R., Ho, P. H., & Chen, A. (2008). A location privacy preserving authentication scheme in vehicular networks. In Wireless communications and networking conference, 2008. WCNC 2008, IEEE (pp. 2543\u20132548). IEEE.","DOI":"10.1109\/WCNC.2008.447"},{"key":"5912_CR19","doi-asserted-by":"crossref","unstructured":"Cai, L., Machiraju, S., & Chen, H. (2010). Capauth: a capability-based handover scheme. In INFOCOM, 2010 Proceedings IEEE (pp. 1\u20135). IEEE.","DOI":"10.1109\/INFCOM.2010.5462208"},{"key":"5912_CR20","unstructured":"Kim, Y., Ren, W., Jo, J. Y., Jiang, Y., & Zheng, J. (2007). SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography. In: IEEE international conference on communications, 2007. ICC\u201907 (pp. 1570\u20131575). IEEE."},{"issue":"10","key":"5912_CR21","doi-asserted-by":"publisher","first-page":"3644","DOI":"10.1109\/TWC.2012.081612.112070","volume":"11","author":"J Cao","year":"2012","unstructured":"Cao, J., Ma, M., & Li, H. (2012). An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Transactions on Wireless Communications, 11(10), 3644\u20133650.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"10","key":"5912_CR22","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1002\/sec.421","volume":"5","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Chen, X., Li, H., & Cao, J. (2012). Identity-based construction for secure and efficient handoff authentication schemes in wireless networks. Security and Communication Networks, 5(10), 1121\u20131130.","journal-title":"Security and Communication Networks"},{"issue":"1","key":"5912_CR23","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/LCOMM.2010.01.091607","volume":"14","author":"J Choi","year":"2010","unstructured":"Choi, J., & Jung, S. (2010). A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters, 14(1), 54\u201356.","journal-title":"IEEE Communications Letters"},{"issue":"8","key":"5912_CR24","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1002\/cpe.3024","volume":"26","author":"Q Han","year":"2014","unstructured":"Han, Q., Zhang, Y., Chen, X., Li, H., & Quan, J. (2014). Efficient and robust identity-based handoff authentication for EAP-based wireless networks. Concurrency and Computation: Practice and Experience, 26(8), 1561\u20131573.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"5912_CR25","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.comnet.2014.10.009","volume":"75","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Chen, X., Li, J., & Li, H. (2014). Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks. Computer Networks, 75, 192\u2013211.","journal-title":"Computer Networks"},{"issue":"4","key":"5912_CR26","first-page":"122","volume":"26","author":"ROH Hs","year":"2010","unstructured":"Hs, R. O. H., & Sh, J. U. N. G. (2010). RSA-based proxy signature for media independent handover. Journal of Measurement Science and Instrumentation, 26(4), 122\u2013127.","journal-title":"Journal of Measurement Science and Instrumentation"},{"key":"5912_CR27","doi-asserted-by":"crossref","unstructured":"Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011). A privacy preserving handover authentication scheme for EAP-based wireless networks. In Global telecommunications conference (GLOBECOM 2011), 2011 IEEE (pp. 1\u20136). IEEE.","DOI":"10.1109\/GLOCOM.2011.6133722"},{"issue":"8","key":"5912_CR28","doi-asserted-by":"publisher","first-page":"2119","DOI":"10.1016\/j.comnet.2012.02.012","volume":"56","author":"J Cao","year":"2012","unstructured":"Cao, J., Li, H., Ma, M., Zhang, Y., & Lai, C. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks. Computer Networks, 56(8), 2119\u20132131.","journal-title":"Computer Networks"},{"issue":"2","key":"5912_CR29","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/S1005-8885(13)60036-9","volume":"20","author":"C Jin","year":"2013","unstructured":"Jin, C., & Hui, L. (2013). Handover authentication between different types of eNBs in LTE networks. The Journal of China Universities of Posts and Telecommunications, 20(2), 106\u2013112.","journal-title":"The Journal of China Universities of Posts and Telecommunications"},{"key":"5912_CR30","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.jnca.2017.01.023","volume":"83","author":"Y Qiu","year":"2017","unstructured":"Qiu, Y., Ma, M., & Wang, X. (2017). A proxy signature-based handover authentication scheme for LTE wireless networks. Journal of Network and Computer Applications, 83, 63\u201371.","journal-title":"Journal of Network and Computer Applications"},{"issue":"9","key":"5912_CR31","first-page":"1338","volume":"79","author":"M Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., & Okamoto, E. (1996). Proxy signatures: Delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 79(9), 1338\u20131354.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"2","key":"5912_CR32","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1016\/j.amc.2004.10.070","volume":"169","author":"R Lu","year":"2005","unstructured":"Lu, R., & Cao, Z. (2005). Designated verifier proxy signature scheme with message recovery. Applied Mathematics and Computation, 169(2), 1237\u20131246.","journal-title":"Applied Mathematics and Computation"},{"issue":"6","key":"5912_CR33","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1049\/ip-cdt:20000888","volume":"147","author":"HM Sun","year":"2000","unstructured":"Sun, H. M. (2000). Design of time-stamped proxy signatures with traceable receivers. IEE Proceedings-Computers and Digital Techniques, 147(6), 462\u2013466.","journal-title":"IEE Proceedings-Computers and Digital Techniques"},{"issue":"4","key":"5912_CR34","doi-asserted-by":"crossref","first-page":"455","DOI":"10.15388\/Informatica.2004.072","volume":"15","author":"ML Das","year":"2004","unstructured":"Das, M. L., Saxena, A., & Gulati, V. P. (2004). An efficient proxy signature scheme with revocation. Informatica, 15(4), 455\u2013464.","journal-title":"Informatica"},{"issue":"2","key":"5912_CR35","first-page":"122","volume":"15","author":"C Ma","year":"2013","unstructured":"Ma, C., Xue, K., & Hong, P. (2013). A proxy signature based re-authentication scheme for secure fast handoff in wireless mesh networks. IJ Network Security, 15(2), 122\u2013132.","journal-title":"IJ Network Security"},{"key":"5912_CR36","unstructured":"Miller, V. S. (1985). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417\u2013426). Springer."},{"key":"5912_CR37","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, The Royal Society, 426, 233\u2013271.","journal-title":"Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, The Royal Society"},{"key":"5912_CR38","unstructured":"Avispa (2005) Automated validation of internet security protocols.\u00a0 http:\/\/www.avispa-project.org .\u00a0Accessed 29 July 2018."},{"key":"5912_CR39","unstructured":"AVISPA. (2004). EAP: Extensible authentication protocol. http:\/\/www.avispa-project.org\/library\/EAP_AKA.html . Online; Accessed April 19, 2017."},{"issue":"4","key":"5912_CR40","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/2981547","volume":"16","author":"N Saxena","year":"2016","unstructured":"Saxena, N., Grijalva, S., & Chaudhari, N. S. (2016). Authentication protocol for an IoT-enabled LTE network. ACM Transactions on Internet Technology (TOIT), 16(4), 25.","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"issue":"1","key":"5912_CR41","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/TVT.2010.2089544","volume":"60","author":"JL Huang","year":"2011","unstructured":"Huang, J. L., Yeh, L. Y., & Chien, H. Y. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 60(1), 248\u2013262.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"5912_CR42","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.comnet.2016.02.007","volume":"99","author":"C Lai","year":"2016","unstructured":"Lai, C., Lu, R., Zheng, D., Li, H., & Shen, X. S. (2016). GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Computer Networks, 99, 66\u201381.","journal-title":"Computer Networks"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5912-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5912-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5912-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T00:08:37Z","timestamp":1604707717000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5912-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,30]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["5912"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5912-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,7,30]]},"assertion":[{"value":"30 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}