Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

An Improved Privacy-Aware Handoff Authentication Protocol for VANETs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Vehicles handover from one road-side unit to another is a common phenomenon in vehicular ad-hoc networks (VANETs). Authenticating vehicles effectively is the key to success of VANETs. Li and Liu et al. proposed a lightweight identity authentication protocol (LIAP) for VANTEs recently, which is based on the concept of dynamic session secret process instead of conventional cryptographic schemes. LIAP possesses many advantages of againsting major existing attacks and performing well at efficiency and low consumption. However, we have demonstrated that the protocol LIAP doesn’t provide user location privacy protection and the resistance of parallel session attack is weak. Therefore, to enhance security of the protocol LIAP, we concatenate the terminal’s pseudo-identity with a random number, then encrypt the connected information by using quadratic residues operation, the generated dynamic identity can against the user location tracking attack. Furthermore, in order to against the parallel session attack during the handover procedure, a new road side unit regenerated a new session secret sequence and computed a challenge sequence with the terminal user’s pseudo-identity through XOR encryption. Through security analysis and experiments, our scheme has higher efficiency and better performance to be applicable to VANETS compared with other existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Lee, J. H., & Bonnin, J. M. (2013). HOTA: Handover optimized ticket-based authentication in network-based mobility management[J]. Information Sciences, 230, 64–77.

    Article  MathSciNet  Google Scholar 

  2. Jia, X. D., Chang, Y. F., Zhang, Z. Z., et al. (2015). A critique of a lightweight identity authentication protocol for vehicular network[J]. Journal of Information Hiding and Multimedia Signal Processing, 6(3), 183–188.

    Google Scholar 

  3. Yang, X., Huang, X., Han, J., et al. (2015). Improved handover authentication and key pre-distribution for wireless mesh networks[J]. Concurrency and Computation: Practice and Experience, 28, 10.

    Google Scholar 

  4. Xiao, P., He, J., & Fu, Y. (2014). An access authentication protocol for trusted handoff in wireless mesh networks[J]. Computer Standards & Interfaces, 36(3), 480–488.

    Article  Google Scholar 

  5. Choi, H. H. (2015). Ad hoc cooperative vertical handover for next-generation heterogeneous networks[J]. AEU-International Journal of Electronics and Communications, 69(10), 1557–1561.

    Article  Google Scholar 

  6. He, D., Chen, C., Chan, S., et al. (2012). Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 11(1), 48–53.

    Article  Google Scholar 

  7. Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 73(3), 1037–1047.

    Article  Google Scholar 

  8. Yeo, S. L., Yap, W. S., Liu, J. K., et al. (2013). Comments on” analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”[J]. Communications Letters, IEEE, 17(8), 1521–1523.

    Article  Google Scholar 

  9. Li, J. S., & Liu, K. H. (2013). A lightweight identity authentication protocol for vehicular networks[J]. Telecommunication Systems, 53(4), 425–438.

    Article  MathSciNet  Google Scholar 

  10. Jurcut, A. D., Coffey, T., & Dojen, R. (2014). Design guidelines for security protocols to prevent replay & parallel session attacks[J]. Computers & Security, 45, 255–273.

    Article  Google Scholar 

  11. Zhang, Y., Chen, X., Li, J., et al. (2014). Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks[J]. Computer Networks, 75, 192–211.

    Article  Google Scholar 

  12. He, D., Bu, J., Chan, S. C., et al. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks[J]. IEEE Transactions on Computers, 62(3), 616–622.

    Article  MathSciNet  Google Scholar 

  13. Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks[J]. Sensors, 14(7), 11379–11394.

    Article  Google Scholar 

  14. He, D., Chan, S., & Guizani, M. (2015). Handover authentication for mobile networks: Security and efficiency aspects[J]. Network, IEEE, 29(3), 96–103.

    Article  Google Scholar 

  15. Yeh, L. Y., & Huang, J. L. (2014). PBS: A portable billing scheme with fine-grained access control for service-oriented vehicular networks[J]. IEEE Transactions on Mobile Computing, 13(11), 2606–2619.

    Article  Google Scholar 

  16. Wu, H. T., Yein, A. D., & Hsieh, W. S. (2015). Message authentication mechanism and privacy protection in the context of vehicular ad hoc networks[J]. Mathematical Problems in Engineering, 501, 569526.

    MathSciNet  MATH  Google Scholar 

  17. Guo, S., Zeng, D., & Xiang, Y. (2014). Chameleon hashing for secure and privacy-preserving vehicular communications[J]. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2794–2803.

    Article  Google Scholar 

  18. Cao, J., Li, H., Ma, M., et al. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks, 56(8), 2119–2131.

    Article  Google Scholar 

  19. Li, G., Jiang, Q., Wei, F., et al. (2015). A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 80(2), 581–589.

    Article  Google Scholar 

  20. Shamus Software Ltd. MIRACL Library[OL]. http://www.shmus.ie/index.php?pages=home,2012-02-17.

Download references

Acknowledgement

This work is supported by the National Natural Science Foundation of China under Grant No. 61373126, and the Special Funds of Basic Research Business Expenses of Central University under Grant No. JUSRP51510.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiping Zhou.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, Z., Zhang, H. & Sun, Z. An Improved Privacy-Aware Handoff Authentication Protocol for VANETs. Wireless Pers Commun 97, 3601–3618 (2017). https://doi.org/10.1007/s11277-017-4688-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4688-z

Keywords