一種新的隱私保護(hù)型車載網(wǎng)絡(luò)切換認(rèn)證協(xié)議
doi: 10.11999/JEIT160015
基金項(xiàng)目:
國(guó)家自然科學(xué)基金(61373126)
中央高?;究蒲袠I(yè)務(wù)費(fèi)專項(xiàng)資金(JUSRP51510)
江蘇省自然科學(xué)基金(BK20131107)
Improved Privacy Protection Handover Authentication Protocol for Vehicular Ad Hoc Networks
Funds:
The National Natural Science Foundation of China (61373126), The Fundamental Research Funds for the Central Universities (JUSRP51510), The Natural Science Foundation of Jiangsu Province (BK20131107)
-
摘要: 該文針對(duì)現(xiàn)有車載網(wǎng)絡(luò)切換認(rèn)證協(xié)議存在的安全性、隱私等方面的不足,在LIAP協(xié)議的基礎(chǔ)上提出改進(jìn)方案。首先將隨機(jī)數(shù)與偽標(biāo)識(shí)串聯(lián),再用二次模運(yùn)算對(duì)串聯(lián)的信息進(jìn)行加密,以生成動(dòng)態(tài)身份標(biāo)識(shí)保護(hù)用戶位置隱私;與此同時(shí),在移動(dòng)終端切換過(guò)程中,新路側(cè)單元重新生成新會(huì)話秘密序列,并與終端偽標(biāo)識(shí)進(jìn)行異或加密,對(duì)LIAP協(xié)議中存在的平行會(huì)話攻擊進(jìn)行安全防護(hù)。理論分析及實(shí)驗(yàn)表明,改進(jìn)協(xié)議不僅滿足終端匿名性和抵御各種攻擊的安全需求,也實(shí)現(xiàn)了較快的切換速度,與同類切換認(rèn)證協(xié)議相比,實(shí)用中具明顯優(yōu)越性。
-
關(guān)鍵詞:
- 車載網(wǎng)絡(luò) /
- 切換認(rèn)證 /
- 二次剩余定理 /
- 隱私防護(hù) /
- 平行會(huì)話攻擊
Abstract: To overcome the shortages in security and privacy of existing handover authentication protocols for vehicle network, an improved scheme based on the Lightweight Identity Authentication Protocol (LIAP) protocol is proposed in this paper. Firstly, terminals pseudo-identity is concatenated with a random number, then quadratic residues operation is utilized to encrypt the connected information and to generate a dynamic identity, which can protect the users location privacy. Meanwhile, the new road side unit regenerates a new session secret sequence and computes the challenge sequence with the terminal users pseudo-identity by XOR encryption, which can provide secure protection against parallel session attack during the handover process. Theoretical analysis and experiments show that the proposed protocol can not only meet security requirements of providing terminal anonymity and defending various attacks, but also achieve a faster switching speed. Therefore, the improved protocol shows obvious superiorities over most existing schemes. -
LEE J H and BONNIN J M. HOTA: Handover optimized ticket-based authentication in network-based mobility management[J]. Information Sciences, 2013, 230(5): 64-77. doi: 10.1016/j.ins.2012.11.006 JIA X D, CHANG Y F, ZHANG Z Z, et al. A critique of a lightweight identity authentication protocol for vehicular network[J]. Journal of Information Hiding and Multimedia Signal Processing, 2015, 6(3): 183-188. YANG X, HUANG X, HAN J, et al. Improved handover authentication and key pre-distribution for wireless mesh networks[J]. Concurrency and Computation: Practice and Experience, 2015, 42(9): 621-628. doi: 10.1002/cpe.3544. XIAO P, HE J, and FU Y. An access authentication protocol for trusted handoff in wireless mesh networks[J]. Computer Standards Interfaces, 2014, 36(3): 480-488. CHOI H H. Ad hoc cooperative vertical handover for next- generation heterogeneous networks[J]. AEU-International Journal of Electronics and Communications, 2015, 69(10): 1557-1561. HE D, CHEN C, CHAN S, et al. Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 2012, 11(1): 48-53. TSAI J L, LO N W, and WU T C. Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 2013, 73(3): 1037-1047. YEO S L, YAP W S, LIU J K, et al. Comments on analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Communications Letters, 2013, 17(8): 1521-1523. LI J S and LIU K H. A lightweight identity authentication protocol for vehicular networks[J]. Telecommunication Systems, 2013, 53(4): 425-438. JURCUT A D, COFFEY T, and DOJEN R. Design guidelines for security protocols to prevent replay parallel session attacks[J]. Computers Security, 2014, 45(6): 255-273. ZHANG Y, CHEN X, LI J, et al. Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks[J]. Computer Networks, 2014, 75(12): 192-211. doi: 10.1016/j.comnet.2014.10.009. HE D, BU J, CHAN S C, et al. Handauth: efficient handover authentication with conditional privacy for wireless networks[J]. IEEE Transactions on Computers, 2013, 62(3): 616-622. WANG W and HU L. A secure and efficient handover authentication protocol for wireless networks[J]. Sensors, 2014, 14(7): 11379-11394. HE D, CHAN S, and GUIZANI M. Handover authentication for mobile networks: security and efficiency aspects[J]. Network, 2015, 29(3): 96-103. YEH L Y and HUANG J L. PBS: a portable billing scheme with fine-grained access control for service-oriented vehicular networks[J]. IEEE Transactions on Mobile Computing, 2014, 13(11): 2606-2619. WU H T, YEIN A D, and HAIEH W S. Message authentication mechanism and privacy protection in the context of vehicular Ad Hoc networks[J]. Mathematical Problems in Engineering, 2015, 501(12): 1-11. GUO S, ZENG D, and XIANG Y. Chameleon hashing for secure and privacy-preserving vehicular communications[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(11): 2794-2803. CAO J, LI H, MA M, et al. A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks, 2012, 56(8): 2119-2131. LI G, JIANG Q, WEI F, et al. A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 2015, 80(2): 581-589. -
計(jì)量
- 文章訪問(wèn)數(shù): 1366
- HTML全文瀏覽量: 132
- PDF下載量: 448
- 被引次數(shù): 0