Advanced Search
Volume 38 Issue 10
Oct.  2016
Turn off MathJax
Article Contents
ZHOU Zhiping, ZHANG Huigen, SUN Ziwen, LI Jing. Improved Privacy Protection Handover Authentication Protocol for Vehicular Ad Hoc Networks[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2633-2639. doi: 10.11999/JEIT160015
Citation: ZHOU Zhiping, ZHANG Huigen, SUN Ziwen, LI Jing. Improved Privacy Protection Handover Authentication Protocol for Vehicular Ad Hoc Networks[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2633-2639. doi: 10.11999/JEIT160015

Improved Privacy Protection Handover Authentication Protocol for Vehicular Ad Hoc Networks

doi: 10.11999/JEIT160015
Funds:

The National Natural Science Foundation of China (61373126), The Fundamental Research Funds for the Central Universities (JUSRP51510), The Natural Science Foundation of Jiangsu Province (BK20131107)

  • Received Date: 2016-01-04
  • Rev Recd Date: 2016-05-19
  • Publish Date: 2016-10-19
  • To overcome the shortages in security and privacy of existing handover authentication protocols for vehicle network, an improved scheme based on the Lightweight Identity Authentication Protocol (LIAP) protocol is proposed in this paper. Firstly, terminals pseudo-identity is concatenated with a random number, then quadratic residues operation is utilized to encrypt the connected information and to generate a dynamic identity, which can protect the users location privacy. Meanwhile, the new road side unit regenerates a new session secret sequence and computes the challenge sequence with the terminal users pseudo-identity by XOR encryption, which can provide secure protection against parallel session attack during the handover process. Theoretical analysis and experiments show that the proposed protocol can not only meet security requirements of providing terminal anonymity and defending various attacks, but also achieve a faster switching speed. Therefore, the improved protocol shows obvious superiorities over most existing schemes.
  • loading
  • LEE J H and BONNIN J M. HOTA: Handover optimized ticket-based authentication in network-based mobility management[J]. Information Sciences, 2013, 230(5): 64-77. doi: 10.1016/j.ins.2012.11.006
    JIA X D, CHANG Y F, ZHANG Z Z, et al. A critique of a lightweight identity authentication protocol for vehicular network[J]. Journal of Information Hiding and Multimedia Signal Processing, 2015, 6(3): 183-188.
    YANG X, HUANG X, HAN J, et al. Improved handover authentication and key pre-distribution for wireless mesh networks[J]. Concurrency and Computation: Practice and Experience, 2015, 42(9): 621-628. doi: 10.1002/cpe.3544.
    XIAO P, HE J, and FU Y. An access authentication protocol for trusted handoff in wireless mesh networks[J]. Computer Standards Interfaces, 2014, 36(3): 480-488.
    CHOI H H. Ad hoc cooperative vertical handover for next- generation heterogeneous networks[J]. AEU-International Journal of Electronics and Communications, 2015, 69(10): 1557-1561.
    HE D, CHEN C, CHAN S, et al. Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 2012, 11(1): 48-53.
    TSAI J L, LO N W, and WU T C. Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 2013, 73(3): 1037-1047.
    YEO S L, YAP W S, LIU J K, et al. Comments on analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Communications Letters, 2013, 17(8): 1521-1523.
    LI J S and LIU K H. A lightweight identity authentication protocol for vehicular networks[J]. Telecommunication Systems, 2013, 53(4): 425-438.
    JURCUT A D, COFFEY T, and DOJEN R. Design guidelines for security protocols to prevent replay parallel session attacks[J]. Computers Security, 2014, 45(6): 255-273.
    ZHANG Y, CHEN X, LI J, et al. Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks[J]. Computer Networks, 2014, 75(12): 192-211. doi: 10.1016/j.comnet.2014.10.009.
    HE D, BU J, CHAN S C, et al. Handauth: efficient handover authentication with conditional privacy for wireless networks[J]. IEEE Transactions on Computers, 2013, 62(3): 616-622.
    WANG W and HU L. A secure and efficient handover authentication protocol for wireless networks[J]. Sensors, 2014, 14(7): 11379-11394.
    HE D, CHAN S, and GUIZANI M. Handover authentication for mobile networks: security and efficiency aspects[J]. Network, 2015, 29(3): 96-103.
    YEH L Y and HUANG J L. PBS: a portable billing scheme with fine-grained access control for service-oriented vehicular networks[J]. IEEE Transactions on Mobile Computing, 2014, 13(11): 2606-2619.
    WU H T, YEIN A D, and HAIEH W S. Message authentication mechanism and privacy protection in the context of vehicular Ad Hoc networks[J]. Mathematical Problems in Engineering, 2015, 501(12): 1-11.
    GUO S, ZENG D, and XIANG Y. Chameleon hashing for secure and privacy-preserving vehicular communications[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(11): 2794-2803.
    CAO J, LI H, MA M, et al. A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks, 2012, 56(8): 2119-2131.
    LI G, JIANG Q, WEI F, et al. A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 2015, 80(2): 581-589.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1322) PDF downloads(441) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return