Citation: | ZHOU Zhiping, ZHANG Huigen, SUN Ziwen, LI Jing. Improved Privacy Protection Handover Authentication Protocol for Vehicular Ad Hoc Networks[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2633-2639. doi: 10.11999/JEIT160015 |
LEE J H and BONNIN J M. HOTA: Handover optimized ticket-based authentication in network-based mobility management[J]. Information Sciences, 2013, 230(5): 64-77. doi: 10.1016/j.ins.2012.11.006
|
JIA X D, CHANG Y F, ZHANG Z Z, et al. A critique of a lightweight identity authentication protocol for vehicular network[J]. Journal of Information Hiding and Multimedia Signal Processing, 2015, 6(3): 183-188.
|
YANG X, HUANG X, HAN J, et al. Improved handover authentication and key pre-distribution for wireless mesh networks[J]. Concurrency and Computation: Practice and Experience, 2015, 42(9): 621-628. doi: 10.1002/cpe.3544.
|
XIAO P, HE J, and FU Y. An access authentication protocol for trusted handoff in wireless mesh networks[J]. Computer Standards Interfaces, 2014, 36(3): 480-488.
|
CHOI H H. Ad hoc cooperative vertical handover for next- generation heterogeneous networks[J]. AEU-International Journal of Electronics and Communications, 2015, 69(10): 1557-1561.
|
HE D, CHEN C, CHAN S, et al. Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 2012, 11(1): 48-53.
|
TSAI J L, LO N W, and WU T C. Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 2013, 73(3): 1037-1047.
|
YEO S L, YAP W S, LIU J K, et al. Comments on analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Communications Letters, 2013, 17(8): 1521-1523.
|
LI J S and LIU K H. A lightweight identity authentication protocol for vehicular networks[J]. Telecommunication Systems, 2013, 53(4): 425-438.
|
JURCUT A D, COFFEY T, and DOJEN R. Design guidelines for security protocols to prevent replay parallel session attacks[J]. Computers Security, 2014, 45(6): 255-273.
|
ZHANG Y, CHEN X, LI J, et al. Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks[J]. Computer Networks, 2014, 75(12): 192-211. doi: 10.1016/j.comnet.2014.10.009.
|
HE D, BU J, CHAN S C, et al. Handauth: efficient handover authentication with conditional privacy for wireless networks[J]. IEEE Transactions on Computers, 2013, 62(3): 616-622.
|
WANG W and HU L. A secure and efficient handover authentication protocol for wireless networks[J]. Sensors, 2014, 14(7): 11379-11394.
|
HE D, CHAN S, and GUIZANI M. Handover authentication for mobile networks: security and efficiency aspects[J]. Network, 2015, 29(3): 96-103.
|
YEH L Y and HUANG J L. PBS: a portable billing scheme with fine-grained access control for service-oriented vehicular networks[J]. IEEE Transactions on Mobile Computing, 2014, 13(11): 2606-2619.
|
WU H T, YEIN A D, and HAIEH W S. Message authentication mechanism and privacy protection in the context of vehicular Ad Hoc networks[J]. Mathematical Problems in Engineering, 2015, 501(12): 1-11.
|
GUO S, ZENG D, and XIANG Y. Chameleon hashing for secure and privacy-preserving vehicular communications[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(11): 2794-2803.
|
CAO J, LI H, MA M, et al. A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks, 2012, 56(8): 2119-2131.
|
LI G, JIANG Q, WEI F, et al. A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 2015, 80(2): 581-589.
|