Vehicles handover from one road-side unit to another is a common phenomenon in vehicular ad-hoc networks (VANETs). Authenticating vehicles effectively is the key to success of VANETs. Li and Liu et al. proposed a lightweight identity authentication protocol (LIAP) for VANTEs recently, which is based on the concept of dynamic session secret process instead of conventional cryptographic schemes. LIAP possesses many advantages of againsting major existing attacks and performing well at efficiency and low consumption. However, we have demonstrated that the protocol LIAP doesn’t provide user location privacy protection and the resistance of parallel session attack is weak. Therefore, to enhance security of the protocol LIAP, we concatenate the terminal’s pseudo-identity with a random number, then encrypt the connected information by using quadratic residues operation, the generated dynamic identity can against the user location tracking attack. Furthermore, in order to against the parallel session attack during the handover procedure, a new road side unit regenerated a new session secret sequence and computed a challenge sequence with the terminal user’s pseudo-identity through XOR encryption. Through security analysis and experiments, our scheme has higher efficiency and better performance to be applicable to VANETS compared with other existing schemes.
This is a preview of subscription content, log in to check access.
This work is supported by the National Natural Science Foundation of China under Grant No. 61373126, and the Special Funds of Basic Research Business Expenses of Central University under Grant No. JUSRP51510.
Lee, J. H., & Bonnin, J. M. (2013). HOTA: Handover optimized ticket-based authentication in network-based mobility management[J]. Information Sciences,230, 64–77.MathSciNetCrossRefGoogle Scholar
Jia, X. D., Chang, Y. F., Zhang, Z. Z., et al. (2015). A critique of a lightweight identity authentication protocol for vehicular network[J]. Journal of Information Hiding and Multimedia Signal Processing,6(3), 183–188.Google Scholar
Yang, X., Huang, X., Han, J., et al. (2015). Improved handover authentication and key pre-distribution for wireless mesh networks[J]. Concurrency and Computation: Practice and Experience,28, 10.Google Scholar
Xiao, P., He, J., & Fu, Y. (2014). An access authentication protocol for trusted handoff in wireless mesh networks[J]. Computer Standards & Interfaces,36(3), 480–488.CrossRefGoogle Scholar
Choi, H. H. (2015). Ad hoc cooperative vertical handover for next-generation heterogeneous networks[J]. AEU-International Journal of Electronics and Communications,69(10), 1557–1561.CrossRefGoogle Scholar
He, D., Chen, C., Chan, S., et al. (2012). Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications,11(1), 48–53.CrossRefGoogle Scholar
Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications,73(3), 1037–1047.CrossRefGoogle Scholar
Yeo, S. L., Yap, W. S., Liu, J. K., et al. (2013). Comments on” analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”[J]. Communications Letters, IEEE,17(8), 1521–1523.CrossRefGoogle Scholar
Li, J. S., & Liu, K. H. (2013). A lightweight identity authentication protocol for vehicular networks[J]. Telecommunication Systems,53(4), 425–438.MathSciNetCrossRefGoogle Scholar
Jurcut, A. D., Coffey, T., & Dojen, R. (2014). Design guidelines for security protocols to prevent replay & parallel session attacks[J]. Computers & Security,45, 255–273.CrossRefGoogle Scholar
Zhang, Y., Chen, X., Li, J., et al. (2014). Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks[J]. Computer Networks,75, 192–211.CrossRefGoogle Scholar
He, D., Bu, J., Chan, S. C., et al. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks[J]. IEEE Transactions on Computers,62(3), 616–622.MathSciNetCrossRefGoogle Scholar
Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks[J]. Sensors,14(7), 11379–11394.CrossRefGoogle Scholar
He, D., Chan, S., & Guizani, M. (2015). Handover authentication for mobile networks: Security and efficiency aspects[J]. Network, IEEE,29(3), 96–103.CrossRefGoogle Scholar
Yeh, L. Y., & Huang, J. L. (2014). PBS: A portable billing scheme with fine-grained access control for service-oriented vehicular networks[J]. IEEE Transactions on Mobile Computing,13(11), 2606–2619.CrossRefGoogle Scholar
Wu, H. T., Yein, A. D., & Hsieh, W. S. (2015). Message authentication mechanism and privacy protection in the context of vehicular ad hoc networks[J]. Mathematical Problems in Engineering,501, 569526.MathSciNetzbMATHGoogle Scholar
Guo, S., Zeng, D., & Xiang, Y. (2014). Chameleon hashing for secure and privacy-preserving vehicular communications[J]. IEEE Transactions on Parallel and Distributed Systems,25(11), 2794–2803.CrossRefGoogle Scholar
Cao, J., Li, H., Ma, M., et al. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks,56(8), 2119–2131.CrossRefGoogle Scholar
Li, G., Jiang, Q., Wei, F., et al. (2015). A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications,80(2), 581–589.CrossRefGoogle Scholar