Skip to main content
Erschienen in: Wireless Personal Communications 3/2017

16.08.2017

An Improved Privacy-Aware Handoff Authentication Protocol for VANETs

verfasst von: Zhiping Zhou, Huigen Zhang, Ziwen Sun

Erschienen in: Wireless Personal Communications | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicles handover from one road-side unit to another is a common phenomenon in vehicular ad-hoc networks (VANETs). Authenticating vehicles effectively is the key to success of VANETs. Li and Liu et al. proposed a lightweight identity authentication protocol (LIAP) for VANTEs recently, which is based on the concept of dynamic session secret process instead of conventional cryptographic schemes. LIAP possesses many advantages of againsting major existing attacks and performing well at efficiency and low consumption. However, we have demonstrated that the protocol LIAP doesn’t provide user location privacy protection and the resistance of parallel session attack is weak. Therefore, to enhance security of the protocol LIAP, we concatenate the terminal’s pseudo-identity with a random number, then encrypt the connected information by using quadratic residues operation, the generated dynamic identity can against the user location tracking attack. Furthermore, in order to against the parallel session attack during the handover procedure, a new road side unit regenerated a new session secret sequence and computed a challenge sequence with the terminal user’s pseudo-identity through XOR encryption. Through security analysis and experiments, our scheme has higher efficiency and better performance to be applicable to VANETS compared with other existing schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lee, J. H., & Bonnin, J. M. (2013). HOTA: Handover optimized ticket-based authentication in network-based mobility management[J]. Information Sciences, 230, 64–77.MathSciNetCrossRef Lee, J. H., & Bonnin, J. M. (2013). HOTA: Handover optimized ticket-based authentication in network-based mobility management[J]. Information Sciences, 230, 64–77.MathSciNetCrossRef
2.
Zurück zum Zitat Jia, X. D., Chang, Y. F., Zhang, Z. Z., et al. (2015). A critique of a lightweight identity authentication protocol for vehicular network[J]. Journal of Information Hiding and Multimedia Signal Processing, 6(3), 183–188. Jia, X. D., Chang, Y. F., Zhang, Z. Z., et al. (2015). A critique of a lightweight identity authentication protocol for vehicular network[J]. Journal of Information Hiding and Multimedia Signal Processing, 6(3), 183–188.
3.
Zurück zum Zitat Yang, X., Huang, X., Han, J., et al. (2015). Improved handover authentication and key pre-distribution for wireless mesh networks[J]. Concurrency and Computation: Practice and Experience, 28, 10. Yang, X., Huang, X., Han, J., et al. (2015). Improved handover authentication and key pre-distribution for wireless mesh networks[J]. Concurrency and Computation: Practice and Experience, 28, 10.
4.
Zurück zum Zitat Xiao, P., He, J., & Fu, Y. (2014). An access authentication protocol for trusted handoff in wireless mesh networks[J]. Computer Standards & Interfaces, 36(3), 480–488.CrossRef Xiao, P., He, J., & Fu, Y. (2014). An access authentication protocol for trusted handoff in wireless mesh networks[J]. Computer Standards & Interfaces, 36(3), 480–488.CrossRef
5.
Zurück zum Zitat Choi, H. H. (2015). Ad hoc cooperative vertical handover for next-generation heterogeneous networks[J]. AEU-International Journal of Electronics and Communications, 69(10), 1557–1561.CrossRef Choi, H. H. (2015). Ad hoc cooperative vertical handover for next-generation heterogeneous networks[J]. AEU-International Journal of Electronics and Communications, 69(10), 1557–1561.CrossRef
6.
Zurück zum Zitat He, D., Chen, C., Chan, S., et al. (2012). Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRef He, D., Chen, C., Chan, S., et al. (2012). Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRef
7.
Zurück zum Zitat Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 73(3), 1037–1047.CrossRef Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 73(3), 1037–1047.CrossRef
8.
Zurück zum Zitat Yeo, S. L., Yap, W. S., Liu, J. K., et al. (2013). Comments on” analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”[J]. Communications Letters, IEEE, 17(8), 1521–1523.CrossRef Yeo, S. L., Yap, W. S., Liu, J. K., et al. (2013). Comments on” analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”[J]. Communications Letters, IEEE, 17(8), 1521–1523.CrossRef
9.
Zurück zum Zitat Li, J. S., & Liu, K. H. (2013). A lightweight identity authentication protocol for vehicular networks[J]. Telecommunication Systems, 53(4), 425–438.MathSciNetCrossRef Li, J. S., & Liu, K. H. (2013). A lightweight identity authentication protocol for vehicular networks[J]. Telecommunication Systems, 53(4), 425–438.MathSciNetCrossRef
10.
Zurück zum Zitat Jurcut, A. D., Coffey, T., & Dojen, R. (2014). Design guidelines for security protocols to prevent replay & parallel session attacks[J]. Computers & Security, 45, 255–273.CrossRef Jurcut, A. D., Coffey, T., & Dojen, R. (2014). Design guidelines for security protocols to prevent replay & parallel session attacks[J]. Computers & Security, 45, 255–273.CrossRef
11.
Zurück zum Zitat Zhang, Y., Chen, X., Li, J., et al. (2014). Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks[J]. Computer Networks, 75, 192–211.CrossRef Zhang, Y., Chen, X., Li, J., et al. (2014). Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks[J]. Computer Networks, 75, 192–211.CrossRef
12.
Zurück zum Zitat He, D., Bu, J., Chan, S. C., et al. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks[J]. IEEE Transactions on Computers, 62(3), 616–622.MathSciNetCrossRef He, D., Bu, J., Chan, S. C., et al. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks[J]. IEEE Transactions on Computers, 62(3), 616–622.MathSciNetCrossRef
13.
Zurück zum Zitat Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks[J]. Sensors, 14(7), 11379–11394.CrossRef Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks[J]. Sensors, 14(7), 11379–11394.CrossRef
14.
Zurück zum Zitat He, D., Chan, S., & Guizani, M. (2015). Handover authentication for mobile networks: Security and efficiency aspects[J]. Network, IEEE, 29(3), 96–103.CrossRef He, D., Chan, S., & Guizani, M. (2015). Handover authentication for mobile networks: Security and efficiency aspects[J]. Network, IEEE, 29(3), 96–103.CrossRef
15.
Zurück zum Zitat Yeh, L. Y., & Huang, J. L. (2014). PBS: A portable billing scheme with fine-grained access control for service-oriented vehicular networks[J]. IEEE Transactions on Mobile Computing, 13(11), 2606–2619.CrossRef Yeh, L. Y., & Huang, J. L. (2014). PBS: A portable billing scheme with fine-grained access control for service-oriented vehicular networks[J]. IEEE Transactions on Mobile Computing, 13(11), 2606–2619.CrossRef
16.
Zurück zum Zitat Wu, H. T., Yein, A. D., & Hsieh, W. S. (2015). Message authentication mechanism and privacy protection in the context of vehicular ad hoc networks[J]. Mathematical Problems in Engineering, 501, 569526.MathSciNetMATH Wu, H. T., Yein, A. D., & Hsieh, W. S. (2015). Message authentication mechanism and privacy protection in the context of vehicular ad hoc networks[J]. Mathematical Problems in Engineering, 501, 569526.MathSciNetMATH
17.
Zurück zum Zitat Guo, S., Zeng, D., & Xiang, Y. (2014). Chameleon hashing for secure and privacy-preserving vehicular communications[J]. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2794–2803.CrossRef Guo, S., Zeng, D., & Xiang, Y. (2014). Chameleon hashing for secure and privacy-preserving vehicular communications[J]. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2794–2803.CrossRef
18.
Zurück zum Zitat Cao, J., Li, H., Ma, M., et al. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks, 56(8), 2119–2131.CrossRef Cao, J., Li, H., Ma, M., et al. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks, 56(8), 2119–2131.CrossRef
19.
Zurück zum Zitat Li, G., Jiang, Q., Wei, F., et al. (2015). A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 80(2), 581–589.CrossRef Li, G., Jiang, Q., Wei, F., et al. (2015). A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 80(2), 581–589.CrossRef
Metadaten
Titel
An Improved Privacy-Aware Handoff Authentication Protocol for VANETs
verfasst von
Zhiping Zhou
Huigen Zhang
Ziwen Sun
Publikationsdatum
16.08.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4688-z

Weitere Artikel der Ausgabe 3/2017

Wireless Personal Communications 3/2017 Zur Ausgabe

Neuer Inhalt