Four-way handshake protocol for authenticating in multiple mix-zones

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Authentication is the process of verifying that the users who they claim to be or not, it is based on identity and credentials. Most of the attacks can be reduced using authentication process. Authentication is important because as the amount of online data sharing has increased, threats and fraud in a large amount are also increased, a changing of the guard which provides security to mobile devices is needed for which authentication is necessary. Privacy of user’s location is important in mobile networks, there are several strategies to protect the personal information (i.e., their location). In previous work it is introduced that the mix zone model which will change the old pseudonyms to new pseudonyms and anonymizes user’s identity by restricting the position where users can be located. Later work, even in the multiple mix-zones model, attackers can attack by using side information (like footprints, navigation etc.). So, we need an authentication protocol while two mix-zones or user-services are communicating. We came across different authentication protocols like PAP, CHAP, and EAP. In this paper, a four-way handshake protocol is implemented for providing authentication while multiple mix-zones are communicating. A four-way handshake authentication protocol i.e., WPA-PSK protocol for verification. WPA-PSK is applied in such a way that both STA(supplicant) and AP(authenticator) can check that they are re-agreeing on a non-forged RSN and IE, therefore they are using the most secure available protocols.


  • Keywords

    Authentication; Mobile Networks; Loca--Tion Based Service; Mix-Zone; Four-Way Handshake.

  • References

      [1] IEEE 802.11i: WLAN Security Standards,

      [2] Farshid Farhat, Somayeh Salimi, A. S. (2014). “Private identification, authentication and key agreement protocol with security mode setup.” Iran Telecommunication Research Centre.

      [3] Li, X. L. X. (2012). “Privacy preserving techniques for location based services in mobile networks.” IEEE 26th International Parallel and Distributed Processing Symposium Workshops PhD Forum.

      [4] G. Lowe, “Casper: A compiler for the analysis of security protocols,” Journal of Computer Security, vol. 6, pp. 53–84, 1998.

      [5] S. Xu, M. M. Matthews, and C.-T. Huang, “Modeling and Analysis of IEEE 802.16 PKM Protocols using CasperFDR,” in IEEE ISWCS ’08.

      [6],Accessed on 14 -03-2010.

      [7] Sen Xu, Chin-Tser Huang, Manton M. Matthews, “Modeling and Analysis of IEEE 802.16 PKM Protocol using CasperFDR”, University of South California, Columbia, SC 29208.

      [8] Neetesh Saxena, N. S. C. (2013). “Extracting physical parameters of mechanical models from identified state-space representations.” CSIT.

      [9] SK Hafizul Islam, G. B. (2017). “A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication.” Journal of King Saud

      [10] University ¸S Computer and Information Sciences.

      [11] Wei Xi, Chen Qian (2016). “Instant and robust authentication and key agreement among mobile devices.” CCS




Article ID: 13039
DOI: 10.14419/ijet.v7i2.4.13039

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.