To overcome the shortages in security and privacy of existing handover authentication protocols for vehicle network, an improved scheme based on the Lightweight Identity Authentication Protocol (LIAP) protocol is proposed in this paper. Firstly, terminal’s pseudo-identity is concatenated with a random number, then quadratic residues operation is utilized to encrypt the connected information and to generate a dynamic identity, which can protect the user’s location privacy. Meanwhile, the new road side unit regenerates a new session secret sequence and computes the challenge sequence with the terminal user’s pseudo-identity by XOR encryption, which can provide secure protection against parallel session attack during the handover process. Theoretical analysis and experiments show that the proposed protocol can not only meet security requirements of providing terminal anonymity and defending various attacks, but also achieve a faster switching speed. Therefore, the improved protocol shows obvious superiorities over most existing schemes.
LEE J H and BONNIN J M. HOTA: Handover optimized ticket-based authentication in network-based mobility management[J]. Information Sciences, 2013, 230(5): 64-77. doi:10.1016/j.ins.2012.11.006
[2]
JIA X D, CHANG Y F, ZHANG Z Z, et al. A critique of a lightweight identity authentication protocol for vehicular network[J]. Journal of Information Hiding and Multimedia Signal Processing, 2015, 6(3): 183-188.
[3]
YANG X, HUANG X, HAN J, et al. Improved handover authentication and key pre-distribution for wireless mesh networks[J]. Concurrency and Computation: Practice and Experience, 2015, 42(9): 621-628. doi: 10.1002/cpe.3544.
[4]
XIAO P, HE J, and FU Y. An access authentication protocol for trusted handoff in wireless mesh networks[J]. Computer Standards & Interfaces, 2014, 36(3): 480-488.
[5]
CHOI H H. Ad hoc cooperative vertical handover for next- generation heterogeneous networks[J]. AEU-International Journal of Electronics and Communications, 2015, 69(10): 1557-1561.
[6]
HE D, CHEN C, CHAN S, et al. Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 2012, 11(1): 48-53.
[7]
TSAI J L, LO N W, and WU T C. Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 2013, 73(3): 1037-1047.
[8]
YEO S L, YAP W S, LIU J K, et al. Comments on “analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”[J]. IEEE Communications Letters, 2013, 17(8): 1521-1523.
[9]
LI J S and LIU K H. A lightweight identity authentication protocol for vehicular networks[J]. Telecommunication Systems, 2013, 53(4): 425-438.
[10]
JURCUT A D, COFFEY T, and DOJEN R. Design guidelines for security protocols to prevent replay & parallel session attacks[J]. Computers & Security, 2014, 45(6): 255-273.
[11]
ZHANG Y, CHEN X, LI J, et al. Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks[J]. Computer Networks, 2014, 75(12): 192-211. doi:10.1016/j.comnet.2014.10.009.
[12]
HE D, BU J, CHAN S C, et al. Handauth: efficient handover authentication with conditional privacy for wireless networks[J]. IEEE Transactions on Computers, 2013, 62(3): 616-622.
[13]
WANG W and HU L. A secure and efficient handover authentication protocol for wireless networks[J]. Sensors, 2014, 14(7): 11379-11394.
[14]
HE D, CHAN S, and GUIZANI M. Handover authentication for mobile networks: security and efficiency aspects[J]. Network, 2015, 29(3): 96-103.
[15]
YEH L Y and HUANG J L. PBS: a portable billing scheme with fine-grained access control for service-oriented vehicular networks[J]. IEEE Transactions on Mobile Computing, 2014, 13(11): 2606-2619.
[16]
WU H T, YEIN A D, and HAIEH W S. Message authentication mechanism and privacy protection in the context of vehicular Ad Hoc networks[J]. Mathematical Problems in Engineering, 2015, 501(12): 1-11.
[17]
GUO S, ZENG D, and XIANG Y. Chameleon hashing for secure and privacy-preserving vehicular communications[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(11): 2794-2803.
[18]
CAO J, LI H, MA M, et al. A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks, 2012, 56(8): 2119-2131.
[19]
LI G, JIANG Q, WEI F, et al. A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 2015, 80(2): 581-589.