Abstract
In vehicular ad-hoc networks (VANETs), vehicles perform a handover procedure in order to connect to the next RSU. In general, the handover procedure comprises two stages, namely searching for an appropriate road side unit (RSU) to connect to and performing an authentication procedure with the selected RSU. Since the vehicles in a VANET typically have a high mobility, frequent handover operations are required, and thus the transmission delay is inevitably increased. Accordingly, this paper proposes an authentication method designated as LIAP (Lightweight Identity Authentication Protocol) to reduce the handover authentication delay. LIAP employs a DSSP (Dynamic Session Secret Process) method to improve the speed and computational efficiency of the authentication process whilst simultaneously concealing the sensitive information of the vehicle. The security analysis results and performance evaluations show that LIAP not only provides an efficient and confidential authentication capability, but also preserves the robustness of the VANET toward malicious attacks.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11235-013-9706-1/MediaObjects/11235_2013_9706_Fig1_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11235-013-9706-1/MediaObjects/11235_2013_9706_Fig2_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11235-013-9706-1/MediaObjects/11235_2013_9706_Fig3_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11235-013-9706-1/MediaObjects/11235_2013_9706_Fig4_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11235-013-9706-1/MediaObjects/11235_2013_9706_Fig5_HTML.gif)
Similar content being viewed by others
References
Jiang, D., Taliwal, V., Meier, A., Holfelder, W., & Herrtwich, R. (2006). Design of 5.9 GHZ DSRC-based vehicular safety communication. IEEE Wireless Communications, 13(5), 36–43.
Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., & Hassan, A. (2010). Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommunications Systems doi:10.1007/s11235-010-9400-5.
Standard specification for telecommunications and information exchange roadside and vehicle systems −5 GHz band dedicated short range communications (DSRC) medium access control (MAC) and physical layer (PHY) specifications. ASTME2213-03, September 2003.
Jiang, D., & Delgrossi, L. (2008). IEEE 802.11p: towards an international standard for wireless access in vehicular environments. In Proceedings of the IEEE vehicular technology conference (VTC 2008), Singapore, May 2008 (pp. 2036–2040).
Chen, Y.-M., & Wei, Y.-C. (2010). SafeAnon: a safe location privacy scheme for vehicular networks. Telecommunications Systems doi:10.1007/s11235-010-9408-x.
Raya, M., & Hubaux, J.-P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68. Special issue on security of ad hoc and sensor networks.
Lu, R., Lin, X., Zhu, H., Ho, P.-H., & Shen, X. (2008). ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In Proceedings of the 27th IEEE international conference on computer communications (INFOCOM, 2008), Phoenix, Arizona, USA, April 2008 (pp. 1229–1237).
Lin, X., Sun, X., Ho, P.-H., & Shen, X. (2007). GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6), 3442–3456.
Weerasinghe, H., & Fu, H. (2010). ESAP: efficient and scalable authentication protocol with conditional privacy for secure vehicular communications. In Proceedings of the IEEE global telecommunications conference (GLOBECOM 2010), Miami, FL, USA, December 2010 (pp. 1729–1734).
IEEE 802 1X-2004 (2004). IEEE standard for local and metropolitan area networks—port-based network access control.
Alimian, A., & Aboba, B. (2004). Analysis of roaming techniques. IEEE contribution 802.11-04/0377r1, March 2004.
Gast, M. (2005) 802.11 wireless networks: the definitive guide. 2nd, O’Reilly Media.
Zhang, C., Liu, R., Ho, P.-H., & Chen, A. (2008). A location privacy preserving authentication scheme in vehicular networks. In Proceedings of the IEEE wireless communications and networking conference (WCNC 2008), Las Vegas, USA, March 2008 (pp. 2543–2548).
Kim, Y., Ren, W., Jo, J.-Y., Yang, M., Jiang, Y., & Zheng, J. (2007). SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography. In Proceedings of the IEEE international conference on communications (ICC 2007), Glasgow, Scotland, June 2007 (pp. 1570–1575).
Masmoudi, K., & Afifi, H. (2008). Building identity-based security associations for provider-provisioned virtual private networks. Telecommunications Systems, 39(3–4), 215–222.
Boneh, D., & Franklin, M. K. (2001). Identity-based encryption from the Weil pairing. In Proceedings of the 21st annual international cryptology conference on advances in cryptology (CRYPTO 2001), Santa Barbara, California, USA, August 2001 (pp. 213–229).
Wang, H., & Prasad, A. R. (2004). Fast authentication for inter-domain handover. In Proceedings of 11th international conference on telecommunications (ICT 2004), Fortaleza, Brazil, August 2004 (pp. 973–982).
Hong, K., Jung, S., & Wu, S. F. (2006). A hash-chain based authentication scheme for fast handover in wireless network. In Proceedings of the international workshop on information security applications (WISA 2005), Jeju Island, Korea, August 2005 (pp. 96–107).
Park, J. H., & **, Q. (2009). Effective session key distribution for secure fast handover in mobile networks. Telecommunications Systems, 44(1–2), 97–107.
Lin, C.-T., & Shieh, S.-P. (2000). Chain authentication in mobile communication systems. Telecommunications Systems, 13(2–4), 213–240.
Mishra, A., Shin, M. H., Petroni, N. L. Jr., Clancy, T. C., & Arbaugh, W. A. (2004). Proactive key distribution using neighbor graphs. IEEE Wireless Communication Magazine, 11(1), 26–36.
Pack, S., & Choi, Y. (2004). Fast handoff scheme based on mobility prediction in public wireless LAN systems. IEE Proceedings. Communications, 151(5), 489–495.
Choi, J., Jung, S., Kim, Y., & Yoo, M. (2009). A fast and efficient handover authentication achieving conditional privacy in V2I networks. In Proceedings of the 9th international conference on next generation wired/wireless networking (NEW2AN 2009), Petersburg, Russia, September 2009 (pp. 291–300).
Ohzahata, S., Kimura, S., & Ebihara, Y. (2002). A fast authentication method for secure and seamless handoff. In Proceedings of the international conference on information networking, wireless communications technologies and network applications (ICOIN 2002), Cheju Island, Korea, January 2002 (pp. 243–252).
Bargh, M. S., Hulsebosch, R. J., Eertink, E. H., Prasad, A., Wang, H., & Schoo, P. (2004). Fast authentication methods for handovers between IEEE 802.11 wireless LANs. In Proceedings of the 2nd ACM international workshop on wireless mobile applications and services on WLAN hotspots (WMASH 2004), Philadelphia, PA, USA, October 2004 (pp. 51–60).
Sahu, P. K., Wu, E. H.-K., Sahoo, J., & Gerla, M. (2010). DDOR: destination discovery oriented routing in highway/freeway VANETs. Telecommunications Systems doi:10.1007/s11235-010-9403-2.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, JS., Liu, KH. A lightweight identity authentication protocol for vehicular networks. Telecommun Syst 53, 425–438 (2013). https://doi.org/10.1007/s11235-013-9706-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-013-9706-1