Skip to main content
Erschienen in: Wireless Personal Communications 3/2015

01.12.2015

A Secure and Efficient Communication Scheme with Authenticated Key Establishment Protocol for Road Networks

verfasst von: Imran Memon

Erschienen in: Wireless Personal Communications | Ausgabe 3/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The authentication protocols are trusted components in a communication system in order to protect sensitive information against a malicious adversary in the road network environment by means of providing a variety of services including users’ privacy and authentication. Authenticated key agreement protocol is a useful cryptographic primitive, which can be used to protect the confidentiality, integrity and authenticity for transmitted data over insecure networks. From the point of view of the management of pre-shared secrets, one of the advantages of three-party authenticated key agreement protocols is that they are more suitable for use in a network with large numbers of users compared with two-party authenticated key agreement protocols. Using smart cards is a practical, secure measure to protect the secret private keys of a user. In this paper, we introduce an Authentication key establishment protocol for IPv6-based Road networks. In this architecture, a mobile vehicle obtains a unique address from a neighbor mobile vehicle or a road side unit without duplicate address detection, and the leaving mobile vehicle’s address space can be automatically reclaimed for reassignment. If the next mobile vehicle located is in transmission range, then the mobile vehicle forwards the packets; if not, then it carries the packets until meeting. The carry mostly occurs on sparsely populated road segments; with long carry distances having long end-to-end packet delays. On the other hand, we also describe a new authentication method based on a cryptographic protocol including a zero-knowledge proof that each node must use to convince another node on the possession of certain secret without revealing anything about it, which allows encrypted communication during authentication. The proposed protocol featured with the following characteristics: Firstly, it offers anonymous authentication: a message issuer can authenticate itself. Secondly, it provides confidential: the secrecy of the communication content can be protected. The address configuration scheme must lower the cost in order to enhance the scalability. Thirdly, it is efficient: it achieves low storage requirements, fast message verification and cost-effective identity tracking in case of a dispute. In this paper, we evaluate the performance of this protocol. The data results show that protocol effectively improves the address configuration performance and our scheme is secure against passive and active attacks. Our scheme provides high security along with low computational and communication costs. As a result, our scheme is practically suitable for mobile devices in the road network environment as compared to other related schemes in the literature.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Joy, C. M., Saurabh, A., & Arobinda, G. (2014). Distributed event notification in VANET with multiple service providers. In DEBS ‘14: Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, May 2014. Joy, C. M., Saurabh, A., & Arobinda, G. (2014). Distributed event notification in VANET with multiple service providers. In DEBS ‘14: Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, May 2014.
2.
Zurück zum Zitat Zitong, C., Yubao, L., Raymond, C.-W. W., Jiamin, X., Ganglin, M., & Cheng, L. (2014). Efficient algorithms for optimal location queries in road networks. In SIGMOD ‘14: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, June 2014. Zitong, C., Yubao, L., Raymond, C.-W. W., Jiamin, X., Ganglin, M., & Cheng, L. (2014). Efficient algorithms for optimal location queries in road networks. In SIGMOD ‘14: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, June 2014.
3.
Zurück zum Zitat Memon, I. (2015). Authentication users privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications,. doi:10.1007/s11277-015-2300-y. Memon, I. (2015). Authentication users privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications,. doi:10.​1007/​s11277-015-2300-y.
4.
Zurück zum Zitat Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2014). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications. doi:10.1007/s11277-014-1996-4. Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2014). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications. doi:10.​1007/​s11277-014-1996-4.
5.
Zurück zum Zitat Alsabaan, M., Alasmary, W., Albasir, A., & Naik, K. (2013). Road network for a greener environment: A survey. IEEE Communications Surveys & Tutorials, 15(3), 1372–1388.CrossRef Alsabaan, M., Alasmary, W., Albasir, A., & Naik, K. (2013). Road network for a greener environment: A survey. IEEE Communications Surveys & Tutorials, 15(3), 1372–1388.CrossRef
6.
Zurück zum Zitat Moore, N. (2006). Optimistic duplicate address detection (DAD) for IPv6. IETF RFC 4429. Moore, N. (2006). Optimistic duplicate address detection (DAD) for IPv6. IETF RFC 4429.
7.
Zurück zum Zitat Czyz, J., Allman, M., Zhang, J., Iekel-Johnson, S., Osterweil, E., & Bailey, M. (2014). Measuring IPv6 adoption. In SIGCOMM ‘14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014. Czyz, J., Allman, M., Zhang, J., Iekel-Johnson, S., Osterweil, E., & Bailey, M. (2014). Measuring IPv6 adoption. In SIGCOMM ‘14: Proceedings of the 2014 ACM Conference on SIGCOMM, August 2014.
8.
Zurück zum Zitat Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79, 661–686. doi:10.1007/s11277-014-1879-8.CrossRef Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79, 661–686. doi:10.​1007/​s11277-014-1879-8.CrossRef
9.
Zurück zum Zitat Ghosh, U., & Datta, R. (2011). A secure dynamic IP configuration scheme for mobile ad hoc networks. Ad Hoc Networks, 9(7), 1327–1342.CrossRef Ghosh, U., & Datta, R. (2011). A secure dynamic IP configuration scheme for mobile ad hoc networks. Ad Hoc Networks, 9(7), 1327–1342.CrossRef
10.
Zurück zum Zitat Wang, X., & Mu, Y. (2013). A secure IPv6 address configuration scheme for a MANET. Security and Communication Networks, 6(6), 777–789.CrossRef Wang, X., & Mu, Y. (2013). A secure IPv6 address configuration scheme for a MANET. Security and Communication Networks, 6(6), 777–789.CrossRef
11.
Zurück zum Zitat Liu, A. X., & Khakpour, A. R. (2013). Quantifying and verifying reachability for access controlled networks. IEEE/ACM Transactions on Networking (TON), 21(2), 551–565. doi:10.1109/TNET.2012.2203144. Liu, A. X., & Khakpour, A. R. (2013). Quantifying and verifying reachability for access controlled networks. IEEE/ACM Transactions on Networking (TON), 21(2), 551–565. doi:10.​1109/​TNET.​2012.​2203144.
12.
Zurück zum Zitat Won, M., & Stoleru, R. (2014). A low-stretch-guaranteed and lightweight geographic routing protocol for large-scale wireless sensor networks. Transactions on Sensor Networks (TOSN), 11(1), 1–18. doi:10.1145/2629659. Won, M., & Stoleru, R. (2014). A low-stretch-guaranteed and lightweight geographic routing protocol for large-scale wireless sensor networks. Transactions on Sensor Networks (TOSN), 11(1), 1–18. doi:10.​1145/​2629659.
13.
Zurück zum Zitat Škoberne, N., Maennel, O., Phillips, I., Bush, R., Zorz, J., & Ciglaric, M. (2014). IPv4 address sharing mechanism classification and tradeoff analysis. IEEE/ACM Transactions on Networking (TON), 22(2), 391–404. Škoberne, N., Maennel, O., Phillips, I., Bush, R., Zorz, J., & Ciglaric, M. (2014). IPv4 address sharing mechanism classification and tradeoff analysis. IEEE/ACM Transactions on Networking (TON), 22(2), 391–404.
14.
Zurück zum Zitat Zhou, H., Mutka, M. W., & Ni, L. M. (2010). Secure prophet address allocation for MANETs. Security and Communication Networks, 3(1), 31–43. Zhou, H., Mutka, M. W., & Ni, L. M. (2010). Secure prophet address allocation for MANETs. Security and Communication Networks, 3(1), 31–43.
15.
Zurück zum Zitat Sun, H.-M., Chen, C.-H., Yeh, C.-W., & Chen, Y.-H. (2013). A collaborative routing protocol against routing disruptions in MANETs. Personal and Ubiquitous Computing, 17(5), 865–874. Sun, H.-M., Chen, C.-H., Yeh, C.-W., & Chen, Y.-H. (2013). A collaborative routing protocol against routing disruptions in MANETs. Personal and Ubiquitous Computing, 17(5), 865–874.
16.
Zurück zum Zitat Shin, H., Talipov, E., & Cha, H. (2012). Spectrum: Lightweight hybrid address autoconfiguration protocol based on virtual coordinates for 6LoWPAN. IEEE Transactions on Mobile Computing, 11(11), 1749–1761.CrossRef Shin, H., Talipov, E., & Cha, H. (2012). Spectrum: Lightweight hybrid address autoconfiguration protocol based on virtual coordinates for 6LoWPAN. IEEE Transactions on Mobile Computing, 11(11), 1749–1761.CrossRef
17.
Zurück zum Zitat Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications, 80(4), 1347–1362. doi:10.1007/s11277-014-2082-7.CrossRef Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications, 80(4), 1347–1362. doi:10.​1007/​s11277-014-2082-7.CrossRef
18.
Zurück zum Zitat Talipov, E., Shin, H., Han, S., et al. (2011). Alightweight stateful address autoconfiguration for6LoWPAN. Wireless Network, 17(1), 183–197.CrossRef Talipov, E., Shin, H., Han, S., et al. (2011). Alightweight stateful address autoconfiguration for6LoWPAN. Wireless Network, 17(1), 183–197.CrossRef
19.
Zurück zum Zitat Al-Mistarihi, M. F., Al-Shurman, M., & Qudaimat, A. (2011). Tree based dynamic address autoconfiguration in mobile ad hoc networks. Computer Networks, 55(8), 1894–1908.CrossRef Al-Mistarihi, M. F., Al-Shurman, M., & Qudaimat, A. (2011). Tree based dynamic address autoconfiguration in mobile ad hoc networks. Computer Networks, 55(8), 1894–1908.CrossRef
20.
Zurück zum Zitat Mohandas, B. K., & Liscano, R. (2008). IP address configuration in VANET using centralized DHCP. In 33rd IEEE local computer networks conference (pp. 608–613) Mohandas, B. K., & Liscano, R. (2008). IP address configuration in VANET using centralized DHCP. In 33rd IEEE local computer networks conference (pp. 608–613)
21.
Zurück zum Zitat Coussement, R., Bensaber, B. A.,, & Biskri, I. (2013). Decision support protocol for intrusion detection in VANETs. In DIVANet ‘13: Proceedings of the third ACM international symposium on design and analysis of intelligent road network and applications. Coussement, R., Bensaber, B. A.,, & Biskri, I. (2013). Decision support protocol for intrusion detection in VANETs. In DIVANet ‘13: Proceedings of the third ACM international symposium on design and analysis of intelligent road network and applications.
22.
Zurück zum Zitat Rafiee, H., & Meinel, C. (2013). Privacy and security in IPv6 networks: challenges and possible solutions. In SIN ‘13: Proceedings of the 6th international conference on security of information and networks, November 2013. Rafiee, H., & Meinel, C. (2013). Privacy and security in IPv6 networks: challenges and possible solutions. In SIN ‘13: Proceedings of the 6th international conference on security of information and networks, November 2013.
23.
Zurück zum Zitat Chen, Y.-S., Cheng, C.-H., Hsu, C.-S., & Chiu, G.-M. (2009). Network mobility protocol for vehicular ad hoc networks. In Wireless communications and networking conference, WCNC (pp. 1–6). Chen, Y.-S., Cheng, C.-H., Hsu, C.-S., & Chiu, G.-M. (2009). Network mobility protocol for vehicular ad hoc networks. In Wireless communications and networking conference, WCNC (pp. 1–6).
24.
Zurück zum Zitat BenMimoune, A., Khasawneh, F. A., Kadoch, M., Sun, S., & Rong, B. (2014). Inter-cell handoff performance improvement in LTE-a multi-hop relay networks. In MobiWac ‘14: Proceedings of the 12th ACM international symposium on mobility management and wireless access. BenMimoune, A., Khasawneh, F. A., Kadoch, M., Sun, S., & Rong, B. (2014). Inter-cell handoff performance improvement in LTE-a multi-hop relay networks. In MobiWac ‘14: Proceedings of the 12th ACM international symposium on mobility management and wireless access.
25.
Zurück zum Zitat Han, J., Lin, Y.-H., Perrig, A., & Bai, F. (2014). Short paper: MVSec: Secure and easy-to-use pairing of mobile devices with vehicles. In WiSec ‘14: Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. Han, J., Lin, Y.-H., Perrig, A., & Bai, F. (2014). Short paper: MVSec: Secure and easy-to-use pairing of mobile devices with vehicles. In WiSec ‘14: Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks.
26.
Zurück zum Zitat Memon, I., Mangi, F. A., & Jamro, D. A. (2013). Collision avoidance of intelligent service robot for industrial security system. IJCSI International Journal of Computer Science Issues, 10(2), 3. Memon, I., Mangi, F. A., & Jamro, D. A. (2013). Collision avoidance of intelligent service robot for industrial security system. IJCSI International Journal of Computer Science Issues, 10(2), 3.
27.
Zurück zum Zitat Kamenyi, D. M., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864. Kamenyi, D. M., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864.
28.
Zurück zum Zitat Memon, I., Mangi, F. A., Jamro, D. A., Basit, M. A., & Memon, M. H. (2013). Rumor riding: Peer to peer systems. International Journal of Scientific & Engineering Research, 4(6), 1020–1028. Memon, I., Mangi, F. A., Jamro, D. A., Basit, M. A., & Memon, M. H. (2013). Rumor riding: Peer to peer systems. International Journal of Scientific & Engineering Research, 4(6), 1020–1028.
29.
Zurück zum Zitat Hwang, T., & Gope, P. (2014). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets. Wireless Personal Communications, 77, 197–224. doi:10.1007/s11277-013-1501-5.CrossRef Hwang, T., & Gope, P. (2014). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets. Wireless Personal Communications, 77, 197–224. doi:10.​1007/​s11277-013-1501-5.CrossRef
30.
Zurück zum Zitat Xiaonan, W., & Shan, Z. (2013). An IPv6 address configuration scheme for wireless sensor networks based on location information. Telecommunication Systems, 52(1), 151–160.CrossRef Xiaonan, W., & Shan, Z. (2013). An IPv6 address configuration scheme for wireless sensor networks based on location information. Telecommunication Systems, 52(1), 151–160.CrossRef
31.
Zurück zum Zitat Chang, B.-J., Liang, Y.-H., & Yang, H.-J. (2014). Performance analysis with traffic accident for cooperative active safety driving in VANET/ITS. Wireless Personal Communications, 74, 731–755. doi:10.1007/s11277-013-1318-2.CrossRef Chang, B.-J., Liang, Y.-H., & Yang, H.-J. (2014). Performance analysis with traffic accident for cooperative active safety driving in VANET/ITS. Wireless Personal Communications, 74, 731–755. doi:10.​1007/​s11277-013-1318-2.CrossRef
32.
Zurück zum Zitat Ying, B., Makrakis, D., & Mouftah, H. T. (2013). Privacy preserving broad cast message authentication protocol for VANETs. Journal of Network and Computer Applications, 36, 1352–1364.CrossRef Ying, B., Makrakis, D., & Mouftah, H. T. (2013). Privacy preserving broad cast message authentication protocol for VANETs. Journal of Network and Computer Applications, 36, 1352–1364.CrossRef
33.
34.
Zurück zum Zitat Chena, Y.-S., Hsu, C.-S., & Yi, W.-H. (2012). An IP passing protocol for vehicular ad hoc networks with network fragmentation. Computers and Mathematics with Applications, 63(2), 407–426.CrossRef Chena, Y.-S., Hsu, C.-S., & Yi, W.-H. (2012). An IP passing protocol for vehicular ad hoc networks with network fragmentation. Computers and Mathematics with Applications, 63(2), 407–426.CrossRef
35.
36.
Zurück zum Zitat Wu, X., Brown, K. N., Sreenan, C. J., Alvarez, P., Ruffini, M., Marchetti, N., et al. (2013). An XG-PON module for the NS-3 network simulator. In SimuTools ‘13: Proceedings of the 6th international ICST conference on simulation tools and techniques, March 2013. Wu, X., Brown, K. N., Sreenan, C. J., Alvarez, P., Ruffini, M., Marchetti, N., et al. (2013). An XG-PON module for the NS-3 network simulator. In SimuTools ‘13: Proceedings of the 6th international ICST conference on simulation tools and techniques, March 2013.
Metadaten
Titel
A Secure and Efficient Communication Scheme with Authenticated Key Establishment Protocol for Road Networks
verfasst von
Imran Memon
Publikationsdatum
01.12.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2833-0

Weitere Artikel der Ausgabe 3/2015

Wireless Personal Communications 3/2015 Zur Ausgabe

Neuer Inhalt