Skip to main content
Top
Published in: Wireless Personal Communications 3/2017

16-08-2017

An Improved Privacy-Aware Handoff Authentication Protocol for VANETs

Authors: Zhiping Zhou, Huigen Zhang, Ziwen Sun

Published in: Wireless Personal Communications | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Vehicles handover from one road-side unit to another is a common phenomenon in vehicular ad-hoc networks (VANETs). Authenticating vehicles effectively is the key to success of VANETs. Li and Liu et al. proposed a lightweight identity authentication protocol (LIAP) for VANTEs recently, which is based on the concept of dynamic session secret process instead of conventional cryptographic schemes. LIAP possesses many advantages of againsting major existing attacks and performing well at efficiency and low consumption. However, we have demonstrated that the protocol LIAP doesn’t provide user location privacy protection and the resistance of parallel session attack is weak. Therefore, to enhance security of the protocol LIAP, we concatenate the terminal’s pseudo-identity with a random number, then encrypt the connected information by using quadratic residues operation, the generated dynamic identity can against the user location tracking attack. Furthermore, in order to against the parallel session attack during the handover procedure, a new road side unit regenerated a new session secret sequence and computed a challenge sequence with the terminal user’s pseudo-identity through XOR encryption. Through security analysis and experiments, our scheme has higher efficiency and better performance to be applicable to VANETS compared with other existing schemes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lee, J. H., & Bonnin, J. M. (2013). HOTA: Handover optimized ticket-based authentication in network-based mobility management[J]. Information Sciences, 230, 64–77.MathSciNetCrossRef Lee, J. H., & Bonnin, J. M. (2013). HOTA: Handover optimized ticket-based authentication in network-based mobility management[J]. Information Sciences, 230, 64–77.MathSciNetCrossRef
2.
go back to reference Jia, X. D., Chang, Y. F., Zhang, Z. Z., et al. (2015). A critique of a lightweight identity authentication protocol for vehicular network[J]. Journal of Information Hiding and Multimedia Signal Processing, 6(3), 183–188. Jia, X. D., Chang, Y. F., Zhang, Z. Z., et al. (2015). A critique of a lightweight identity authentication protocol for vehicular network[J]. Journal of Information Hiding and Multimedia Signal Processing, 6(3), 183–188.
3.
go back to reference Yang, X., Huang, X., Han, J., et al. (2015). Improved handover authentication and key pre-distribution for wireless mesh networks[J]. Concurrency and Computation: Practice and Experience, 28, 10. Yang, X., Huang, X., Han, J., et al. (2015). Improved handover authentication and key pre-distribution for wireless mesh networks[J]. Concurrency and Computation: Practice and Experience, 28, 10.
4.
go back to reference Xiao, P., He, J., & Fu, Y. (2014). An access authentication protocol for trusted handoff in wireless mesh networks[J]. Computer Standards & Interfaces, 36(3), 480–488.CrossRef Xiao, P., He, J., & Fu, Y. (2014). An access authentication protocol for trusted handoff in wireless mesh networks[J]. Computer Standards & Interfaces, 36(3), 480–488.CrossRef
5.
go back to reference Choi, H. H. (2015). Ad hoc cooperative vertical handover for next-generation heterogeneous networks[J]. AEU-International Journal of Electronics and Communications, 69(10), 1557–1561.CrossRef Choi, H. H. (2015). Ad hoc cooperative vertical handover for next-generation heterogeneous networks[J]. AEU-International Journal of Electronics and Communications, 69(10), 1557–1561.CrossRef
6.
go back to reference He, D., Chen, C., Chan, S., et al. (2012). Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRef He, D., Chen, C., Chan, S., et al. (2012). Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRef
7.
go back to reference Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 73(3), 1037–1047.CrossRef Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 73(3), 1037–1047.CrossRef
8.
go back to reference Yeo, S. L., Yap, W. S., Liu, J. K., et al. (2013). Comments on” analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”[J]. Communications Letters, IEEE, 17(8), 1521–1523.CrossRef Yeo, S. L., Yap, W. S., Liu, J. K., et al. (2013). Comments on” analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”[J]. Communications Letters, IEEE, 17(8), 1521–1523.CrossRef
9.
go back to reference Li, J. S., & Liu, K. H. (2013). A lightweight identity authentication protocol for vehicular networks[J]. Telecommunication Systems, 53(4), 425–438.MathSciNetCrossRef Li, J. S., & Liu, K. H. (2013). A lightweight identity authentication protocol for vehicular networks[J]. Telecommunication Systems, 53(4), 425–438.MathSciNetCrossRef
10.
go back to reference Jurcut, A. D., Coffey, T., & Dojen, R. (2014). Design guidelines for security protocols to prevent replay & parallel session attacks[J]. Computers & Security, 45, 255–273.CrossRef Jurcut, A. D., Coffey, T., & Dojen, R. (2014). Design guidelines for security protocols to prevent replay & parallel session attacks[J]. Computers & Security, 45, 255–273.CrossRef
11.
go back to reference Zhang, Y., Chen, X., Li, J., et al. (2014). Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks[J]. Computer Networks, 75, 192–211.CrossRef Zhang, Y., Chen, X., Li, J., et al. (2014). Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks[J]. Computer Networks, 75, 192–211.CrossRef
12.
go back to reference He, D., Bu, J., Chan, S. C., et al. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks[J]. IEEE Transactions on Computers, 62(3), 616–622.MathSciNetCrossRef He, D., Bu, J., Chan, S. C., et al. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks[J]. IEEE Transactions on Computers, 62(3), 616–622.MathSciNetCrossRef
13.
go back to reference Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks[J]. Sensors, 14(7), 11379–11394.CrossRef Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks[J]. Sensors, 14(7), 11379–11394.CrossRef
14.
go back to reference He, D., Chan, S., & Guizani, M. (2015). Handover authentication for mobile networks: Security and efficiency aspects[J]. Network, IEEE, 29(3), 96–103.CrossRef He, D., Chan, S., & Guizani, M. (2015). Handover authentication for mobile networks: Security and efficiency aspects[J]. Network, IEEE, 29(3), 96–103.CrossRef
15.
go back to reference Yeh, L. Y., & Huang, J. L. (2014). PBS: A portable billing scheme with fine-grained access control for service-oriented vehicular networks[J]. IEEE Transactions on Mobile Computing, 13(11), 2606–2619.CrossRef Yeh, L. Y., & Huang, J. L. (2014). PBS: A portable billing scheme with fine-grained access control for service-oriented vehicular networks[J]. IEEE Transactions on Mobile Computing, 13(11), 2606–2619.CrossRef
16.
go back to reference Wu, H. T., Yein, A. D., & Hsieh, W. S. (2015). Message authentication mechanism and privacy protection in the context of vehicular ad hoc networks[J]. Mathematical Problems in Engineering, 501, 569526.MathSciNetMATH Wu, H. T., Yein, A. D., & Hsieh, W. S. (2015). Message authentication mechanism and privacy protection in the context of vehicular ad hoc networks[J]. Mathematical Problems in Engineering, 501, 569526.MathSciNetMATH
17.
go back to reference Guo, S., Zeng, D., & Xiang, Y. (2014). Chameleon hashing for secure and privacy-preserving vehicular communications[J]. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2794–2803.CrossRef Guo, S., Zeng, D., & Xiang, Y. (2014). Chameleon hashing for secure and privacy-preserving vehicular communications[J]. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2794–2803.CrossRef
18.
go back to reference Cao, J., Li, H., Ma, M., et al. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks, 56(8), 2119–2131.CrossRef Cao, J., Li, H., Ma, M., et al. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks, 56(8), 2119–2131.CrossRef
19.
go back to reference Li, G., Jiang, Q., Wei, F., et al. (2015). A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 80(2), 581–589.CrossRef Li, G., Jiang, Q., Wei, F., et al. (2015). A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 80(2), 581–589.CrossRef
Metadata
Title
An Improved Privacy-Aware Handoff Authentication Protocol for VANETs
Authors
Zhiping Zhou
Huigen Zhang
Ziwen Sun
Publication date
16-08-2017
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4688-z

Other articles of this Issue 3/2017

Wireless Personal Communications 3/2017 Go to the issue