Log in

A lightweight identity authentication protocol for vehicular networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In vehicular ad-hoc networks (VANETs), vehicles perform a handover procedure in order to connect to the next RSU. In general, the handover procedure comprises two stages, namely searching for an appropriate road side unit (RSU) to connect to and performing an authentication procedure with the selected RSU. Since the vehicles in a VANET typically have a high mobility, frequent handover operations are required, and thus the transmission delay is inevitably increased. Accordingly, this paper proposes an authentication method designated as LIAP (Lightweight Identity Authentication Protocol) to reduce the handover authentication delay. LIAP employs a DSSP (Dynamic Session Secret Process) method to improve the speed and computational efficiency of the authentication process whilst simultaneously concealing the sensitive information of the vehicle. The security analysis results and performance evaluations show that LIAP not only provides an efficient and confidential authentication capability, but also preserves the robustness of the VANET toward malicious attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Jiang, D., Taliwal, V., Meier, A., Holfelder, W., & Herrtwich, R. (2006). Design of 5.9 GHZ DSRC-based vehicular safety communication. IEEE Wireless Communications, 13(5), 36–43.

    Article  Google Scholar 

  2. Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., & Hassan, A. (2010). Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommunications Systems doi:10.1007/s11235-010-9400-5.

    Google Scholar 

  3. Standard specification for telecommunications and information exchange roadside and vehicle systems −5 GHz band dedicated short range communications (DSRC) medium access control (MAC) and physical layer (PHY) specifications. ASTME2213-03, September 2003.

  4. Jiang, D., & Delgrossi, L. (2008). IEEE 802.11p: towards an international standard for wireless access in vehicular environments. In Proceedings of the IEEE vehicular technology conference (VTC 2008), Singapore, May 2008 (pp. 2036–2040).

    Chapter  Google Scholar 

  5. Chen, Y.-M., & Wei, Y.-C. (2010). SafeAnon: a safe location privacy scheme for vehicular networks. Telecommunications Systems doi:10.1007/s11235-010-9408-x.

    Google Scholar 

  6. Raya, M., & Hubaux, J.-P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68. Special issue on security of ad hoc and sensor networks.

    Google Scholar 

  7. Lu, R., Lin, X., Zhu, H., Ho, P.-H., & Shen, X. (2008). ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In Proceedings of the 27th IEEE international conference on computer communications (INFOCOM, 2008), Phoenix, Arizona, USA, April 2008 (pp. 1229–1237).

    Chapter  Google Scholar 

  8. Lin, X., Sun, X., Ho, P.-H., & Shen, X. (2007). GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6), 3442–3456.

    Article  Google Scholar 

  9. Weerasinghe, H., & Fu, H. (2010). ESAP: efficient and scalable authentication protocol with conditional privacy for secure vehicular communications. In Proceedings of the IEEE global telecommunications conference (GLOBECOM 2010), Miami, FL, USA, December 2010 (pp. 1729–1734).

    Google Scholar 

  10. IEEE 802 1X-2004 (2004). IEEE standard for local and metropolitan area networks—port-based network access control.

  11. Alimian, A., & Aboba, B. (2004). Analysis of roaming techniques. IEEE contribution 802.11-04/0377r1, March 2004.

  12. Gast, M. (2005) 802.11 wireless networks: the definitive guide. 2nd, O’Reilly Media.

  13. Zhang, C., Liu, R., Ho, P.-H., & Chen, A. (2008). A location privacy preserving authentication scheme in vehicular networks. In Proceedings of the IEEE wireless communications and networking conference (WCNC 2008), Las Vegas, USA, March 2008 (pp. 2543–2548).

    Chapter  Google Scholar 

  14. Kim, Y., Ren, W., Jo, J.-Y., Yang, M., Jiang, Y., & Zheng, J. (2007). SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography. In Proceedings of the IEEE international conference on communications (ICC 2007), Glasgow, Scotland, June 2007 (pp. 1570–1575).

    Chapter  Google Scholar 

  15. Masmoudi, K., & Afifi, H. (2008). Building identity-based security associations for provider-provisioned virtual private networks. Telecommunications Systems, 39(3–4), 215–222.

    Article  Google Scholar 

  16. Boneh, D., & Franklin, M. K. (2001). Identity-based encryption from the Weil pairing. In Proceedings of the 21st annual international cryptology conference on advances in cryptology (CRYPTO 2001), Santa Barbara, California, USA, August 2001 (pp. 213–229).

    Chapter  Google Scholar 

  17. Wang, H., & Prasad, A. R. (2004). Fast authentication for inter-domain handover. In Proceedings of 11th international conference on telecommunications (ICT 2004), Fortaleza, Brazil, August 2004 (pp. 973–982).

    Google Scholar 

  18. Hong, K., Jung, S., & Wu, S. F. (2006). A hash-chain based authentication scheme for fast handover in wireless network. In Proceedings of the international workshop on information security applications (WISA 2005), Jeju Island, Korea, August 2005 (pp. 96–107).

    Chapter  Google Scholar 

  19. Park, J. H., & **, Q. (2009). Effective session key distribution for secure fast handover in mobile networks. Telecommunications Systems, 44(1–2), 97–107.

    Google Scholar 

  20. Lin, C.-T., & Shieh, S.-P. (2000). Chain authentication in mobile communication systems. Telecommunications Systems, 13(2–4), 213–240.

    Article  Google Scholar 

  21. Mishra, A., Shin, M. H., Petroni, N. L. Jr., Clancy, T. C., & Arbaugh, W. A. (2004). Proactive key distribution using neighbor graphs. IEEE Wireless Communication Magazine, 11(1), 26–36.

    Article  Google Scholar 

  22. Pack, S., & Choi, Y. (2004). Fast handoff scheme based on mobility prediction in public wireless LAN systems. IEE Proceedings. Communications, 151(5), 489–495.

    Article  Google Scholar 

  23. Choi, J., Jung, S., Kim, Y., & Yoo, M. (2009). A fast and efficient handover authentication achieving conditional privacy in V2I networks. In Proceedings of the 9th international conference on next generation wired/wireless networking (NEW2AN 2009), Petersburg, Russia, September 2009 (pp. 291–300).

    Chapter  Google Scholar 

  24. Ohzahata, S., Kimura, S., & Ebihara, Y. (2002). A fast authentication method for secure and seamless handoff. In Proceedings of the international conference on information networking, wireless communications technologies and network applications (ICOIN 2002), Cheju Island, Korea, January 2002 (pp. 243–252).

    Chapter  Google Scholar 

  25. Bargh, M. S., Hulsebosch, R. J., Eertink, E. H., Prasad, A., Wang, H., & Schoo, P. (2004). Fast authentication methods for handovers between IEEE 802.11 wireless LANs. In Proceedings of the 2nd ACM international workshop on wireless mobile applications and services on WLAN hotspots (WMASH 2004), Philadelphia, PA, USA, October 2004 (pp. 51–60).

    Chapter  Google Scholar 

  26. Sahu, P. K., Wu, E. H.-K., Sahoo, J., & Gerla, M. (2010). DDOR: destination discovery oriented routing in highway/freeway VANETs. Telecommunications Systems doi:10.1007/s11235-010-9403-2.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jung-Shian Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, JS., Liu, KH. A lightweight identity authentication protocol for vehicular networks. Telecommun Syst 53, 425–438 (2013). https://doi.org/10.1007/s11235-013-9706-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-013-9706-1

Keywords

Navigation