Skip to main content
Top
Published in: Telecommunication Systems 4/2013

01-08-2013

A lightweight identity authentication protocol for vehicular networks

Authors: Jung-Shian Li, Kun-Hsuan Liu

Published in: Telecommunication Systems | Issue 4/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In vehicular ad-hoc networks (VANETs), vehicles perform a handover procedure in order to connect to the next RSU. In general, the handover procedure comprises two stages, namely searching for an appropriate road side unit (RSU) to connect to and performing an authentication procedure with the selected RSU. Since the vehicles in a VANET typically have a high mobility, frequent handover operations are required, and thus the transmission delay is inevitably increased. Accordingly, this paper proposes an authentication method designated as LIAP (Lightweight Identity Authentication Protocol) to reduce the handover authentication delay. LIAP employs a DSSP (Dynamic Session Secret Process) method to improve the speed and computational efficiency of the authentication process whilst simultaneously concealing the sensitive information of the vehicle. The security analysis results and performance evaluations show that LIAP not only provides an efficient and confidential authentication capability, but also preserves the robustness of the VANET toward malicious attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jiang, D., Taliwal, V., Meier, A., Holfelder, W., & Herrtwich, R. (2006). Design of 5.9 GHZ DSRC-based vehicular safety communication. IEEE Wireless Communications, 13(5), 36–43. CrossRef Jiang, D., Taliwal, V., Meier, A., Holfelder, W., & Herrtwich, R. (2006). Design of 5.9 GHZ DSRC-based vehicular safety communication. IEEE Wireless Communications, 13(5), 36–43. CrossRef
2.
go back to reference Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., & Hassan, A. (2010). Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommunications Systems doi:10.1007/s11235-010-9400-5. Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., & Hassan, A. (2010). Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommunications Systems doi:10.​1007/​s11235-010-9400-5.
3.
go back to reference Standard specification for telecommunications and information exchange roadside and vehicle systems −5 GHz band dedicated short range communications (DSRC) medium access control (MAC) and physical layer (PHY) specifications. ASTME2213-03, September 2003. Standard specification for telecommunications and information exchange roadside and vehicle systems −5 GHz band dedicated short range communications (DSRC) medium access control (MAC) and physical layer (PHY) specifications. ASTME2213-03, September 2003.
4.
go back to reference Jiang, D., & Delgrossi, L. (2008). IEEE 802.11p: towards an international standard for wireless access in vehicular environments. In Proceedings of the IEEE vehicular technology conference (VTC 2008), Singapore, May 2008 (pp. 2036–2040). CrossRef Jiang, D., & Delgrossi, L. (2008). IEEE 802.11p: towards an international standard for wireless access in vehicular environments. In Proceedings of the IEEE vehicular technology conference (VTC 2008), Singapore, May 2008 (pp. 2036–2040). CrossRef
6.
go back to reference Raya, M., & Hubaux, J.-P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68. Special issue on security of ad hoc and sensor networks. Raya, M., & Hubaux, J.-P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68. Special issue on security of ad hoc and sensor networks.
7.
go back to reference Lu, R., Lin, X., Zhu, H., Ho, P.-H., & Shen, X. (2008). ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In Proceedings of the 27th IEEE international conference on computer communications (INFOCOM, 2008), Phoenix, Arizona, USA, April 2008 (pp. 1229–1237). CrossRef Lu, R., Lin, X., Zhu, H., Ho, P.-H., & Shen, X. (2008). ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In Proceedings of the 27th IEEE international conference on computer communications (INFOCOM, 2008), Phoenix, Arizona, USA, April 2008 (pp. 1229–1237). CrossRef
8.
go back to reference Lin, X., Sun, X., Ho, P.-H., & Shen, X. (2007). GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6), 3442–3456. CrossRef Lin, X., Sun, X., Ho, P.-H., & Shen, X. (2007). GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6), 3442–3456. CrossRef
9.
go back to reference Weerasinghe, H., & Fu, H. (2010). ESAP: efficient and scalable authentication protocol with conditional privacy for secure vehicular communications. In Proceedings of the IEEE global telecommunications conference (GLOBECOM 2010), Miami, FL, USA, December 2010 (pp. 1729–1734). Weerasinghe, H., & Fu, H. (2010). ESAP: efficient and scalable authentication protocol with conditional privacy for secure vehicular communications. In Proceedings of the IEEE global telecommunications conference (GLOBECOM 2010), Miami, FL, USA, December 2010 (pp. 1729–1734).
10.
go back to reference IEEE 802 1X-2004 (2004). IEEE standard for local and metropolitan area networks—port-based network access control. IEEE 802 1X-2004 (2004). IEEE standard for local and metropolitan area networks—port-based network access control.
11.
go back to reference Alimian, A., & Aboba, B. (2004). Analysis of roaming techniques. IEEE contribution 802.11-04/0377r1, March 2004. Alimian, A., & Aboba, B. (2004). Analysis of roaming techniques. IEEE contribution 802.11-04/0377r1, March 2004.
12.
go back to reference Gast, M. (2005) 802.11 wireless networks: the definitive guide. 2nd, O’Reilly Media. Gast, M. (2005) 802.11 wireless networks: the definitive guide. 2nd, O’Reilly Media.
13.
go back to reference Zhang, C., Liu, R., Ho, P.-H., & Chen, A. (2008). A location privacy preserving authentication scheme in vehicular networks. In Proceedings of the IEEE wireless communications and networking conference (WCNC 2008), Las Vegas, USA, March 2008 (pp. 2543–2548). CrossRef Zhang, C., Liu, R., Ho, P.-H., & Chen, A. (2008). A location privacy preserving authentication scheme in vehicular networks. In Proceedings of the IEEE wireless communications and networking conference (WCNC 2008), Las Vegas, USA, March 2008 (pp. 2543–2548). CrossRef
14.
go back to reference Kim, Y., Ren, W., Jo, J.-Y., Yang, M., Jiang, Y., & Zheng, J. (2007). SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography. In Proceedings of the IEEE international conference on communications (ICC 2007), Glasgow, Scotland, June 2007 (pp. 1570–1575). CrossRef Kim, Y., Ren, W., Jo, J.-Y., Yang, M., Jiang, Y., & Zheng, J. (2007). SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography. In Proceedings of the IEEE international conference on communications (ICC 2007), Glasgow, Scotland, June 2007 (pp. 1570–1575). CrossRef
15.
go back to reference Masmoudi, K., & Afifi, H. (2008). Building identity-based security associations for provider-provisioned virtual private networks. Telecommunications Systems, 39(3–4), 215–222. CrossRef Masmoudi, K., & Afifi, H. (2008). Building identity-based security associations for provider-provisioned virtual private networks. Telecommunications Systems, 39(3–4), 215–222. CrossRef
16.
go back to reference Boneh, D., & Franklin, M. K. (2001). Identity-based encryption from the Weil pairing. In Proceedings of the 21st annual international cryptology conference on advances in cryptology (CRYPTO 2001), Santa Barbara, California, USA, August 2001 (pp. 213–229). CrossRef Boneh, D., & Franklin, M. K. (2001). Identity-based encryption from the Weil pairing. In Proceedings of the 21st annual international cryptology conference on advances in cryptology (CRYPTO 2001), Santa Barbara, California, USA, August 2001 (pp. 213–229). CrossRef
17.
go back to reference Wang, H., & Prasad, A. R. (2004). Fast authentication for inter-domain handover. In Proceedings of 11th international conference on telecommunications (ICT 2004), Fortaleza, Brazil, August 2004 (pp. 973–982). Wang, H., & Prasad, A. R. (2004). Fast authentication for inter-domain handover. In Proceedings of 11th international conference on telecommunications (ICT 2004), Fortaleza, Brazil, August 2004 (pp. 973–982).
18.
go back to reference Hong, K., Jung, S., & Wu, S. F. (2006). A hash-chain based authentication scheme for fast handover in wireless network. In Proceedings of the international workshop on information security applications (WISA 2005), Jeju Island, Korea, August 2005 (pp. 96–107). CrossRef Hong, K., Jung, S., & Wu, S. F. (2006). A hash-chain based authentication scheme for fast handover in wireless network. In Proceedings of the international workshop on information security applications (WISA 2005), Jeju Island, Korea, August 2005 (pp. 96–107). CrossRef
19.
go back to reference Park, J. H., & Jin, Q. (2009). Effective session key distribution for secure fast handover in mobile networks. Telecommunications Systems, 44(1–2), 97–107. Park, J. H., & Jin, Q. (2009). Effective session key distribution for secure fast handover in mobile networks. Telecommunications Systems, 44(1–2), 97–107.
20.
go back to reference Lin, C.-T., & Shieh, S.-P. (2000). Chain authentication in mobile communication systems. Telecommunications Systems, 13(2–4), 213–240. CrossRef Lin, C.-T., & Shieh, S.-P. (2000). Chain authentication in mobile communication systems. Telecommunications Systems, 13(2–4), 213–240. CrossRef
21.
go back to reference Mishra, A., Shin, M. H., Petroni, N. L. Jr., Clancy, T. C., & Arbaugh, W. A. (2004). Proactive key distribution using neighbor graphs. IEEE Wireless Communication Magazine, 11(1), 26–36. CrossRef Mishra, A., Shin, M. H., Petroni, N. L. Jr., Clancy, T. C., & Arbaugh, W. A. (2004). Proactive key distribution using neighbor graphs. IEEE Wireless Communication Magazine, 11(1), 26–36. CrossRef
22.
go back to reference Pack, S., & Choi, Y. (2004). Fast handoff scheme based on mobility prediction in public wireless LAN systems. IEE Proceedings. Communications, 151(5), 489–495. CrossRef Pack, S., & Choi, Y. (2004). Fast handoff scheme based on mobility prediction in public wireless LAN systems. IEE Proceedings. Communications, 151(5), 489–495. CrossRef
23.
go back to reference Choi, J., Jung, S., Kim, Y., & Yoo, M. (2009). A fast and efficient handover authentication achieving conditional privacy in V2I networks. In Proceedings of the 9th international conference on next generation wired/wireless networking (NEW2AN 2009), Petersburg, Russia, September 2009 (pp. 291–300). CrossRef Choi, J., Jung, S., Kim, Y., & Yoo, M. (2009). A fast and efficient handover authentication achieving conditional privacy in V2I networks. In Proceedings of the 9th international conference on next generation wired/wireless networking (NEW2AN 2009), Petersburg, Russia, September 2009 (pp. 291–300). CrossRef
24.
go back to reference Ohzahata, S., Kimura, S., & Ebihara, Y. (2002). A fast authentication method for secure and seamless handoff. In Proceedings of the international conference on information networking, wireless communications technologies and network applications (ICOIN 2002), Cheju Island, Korea, January 2002 (pp. 243–252). CrossRef Ohzahata, S., Kimura, S., & Ebihara, Y. (2002). A fast authentication method for secure and seamless handoff. In Proceedings of the international conference on information networking, wireless communications technologies and network applications (ICOIN 2002), Cheju Island, Korea, January 2002 (pp. 243–252). CrossRef
25.
go back to reference Bargh, M. S., Hulsebosch, R. J., Eertink, E. H., Prasad, A., Wang, H., & Schoo, P. (2004). Fast authentication methods for handovers between IEEE 802.11 wireless LANs. In Proceedings of the 2nd ACM international workshop on wireless mobile applications and services on WLAN hotspots (WMASH 2004), Philadelphia, PA, USA, October 2004 (pp. 51–60). CrossRef Bargh, M. S., Hulsebosch, R. J., Eertink, E. H., Prasad, A., Wang, H., & Schoo, P. (2004). Fast authentication methods for handovers between IEEE 802.11 wireless LANs. In Proceedings of the 2nd ACM international workshop on wireless mobile applications and services on WLAN hotspots (WMASH 2004), Philadelphia, PA, USA, October 2004 (pp. 51–60). CrossRef
26.
go back to reference Sahu, P. K., Wu, E. H.-K., Sahoo, J., & Gerla, M. (2010). DDOR: destination discovery oriented routing in highway/freeway VANETs. Telecommunications Systems doi:10.1007/s11235-010-9403-2. Sahu, P. K., Wu, E. H.-K., Sahoo, J., & Gerla, M. (2010). DDOR: destination discovery oriented routing in highway/freeway VANETs. Telecommunications Systems doi:10.​1007/​s11235-010-9403-2.
Metadata
Title
A lightweight identity authentication protocol for vehicular networks
Authors
Jung-Shian Li
Kun-Hsuan Liu
Publication date
01-08-2013
Publisher
Springer US
Published in
Telecommunication Systems / Issue 4/2013
Print ISSN: 1018-4864
Electronic ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-013-9706-1

Other articles of this Issue 4/2013

Telecommunication Systems 4/2013 Go to the issue