期刊文献+

一种新的隐私保护型车载网络切换认证协议 被引量:1

Improved Privacy Protection Handover Authentication Protocol for Vehicular Ad Hoc Networks
下载PDF
导出
摘要 该文针对现有车载网络切换认证协议存在的安全性、隐私等方面的不足,在LIAP协议的基础上提出改进方案。首先将随机数与伪标识串联,再用二次模运算对串联的信息进行加密,以生成动态身份标识保护用户位置隐私;与此同时,在移动终端切换过程中,新路侧单元重新生成新会话秘密序列,并与终端伪标识进行异或加密,对LIAP协议中存在的平行会话攻击进行安全防护。理论分析及实验表明,改进协议不仅满足终端匿名性和抵御各种攻击的安全需求,也实现了较快的切换速度,与同类切换认证协议相比,实用中具明显优越性。 To overcome the shortages in security and privacy of existing handover authentication protocols for vehicle network, an improved scheme based on the Lightweight Identity Authentication Protocol (LIAP) protocol is proposed in this paper. Firstly, terminal's pseudo-identity is concatenated with a random number, then quadratic residues operation is utilized to encrypt the connected information and to generate a dynamic identity, which can protect the user's location privacy. Meanwhile, the new road side unit regenerates a new session secret sequence and computes the challenge sequence with the terminal user's pseudo-identity by XOR encryption, which can provide secure protection against parallel session attack during the handover process. Theoretical analysis and experiments show that the proposed protocol can not only meet security requirements of providing terminal anonymity and defending various attacks, but also achieve a faster switching speed. Therefore, the improved protocol shows obvious superiorities over most existing schemes.
出处 《电子与信息学报》 EI CSCD 北大核心 2016年第10期2633-2639,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61373126) 中央高校基本科研业务费专项资金(JUSRP51510) 江苏省自然科学基金(BK20131107)~~
关键词 车载网络 切换认证 二次剩余定理 隐私防护 平行会话攻击 Vehicle network Handover authentication Quadratic residue theorem Privacy protection Parallel session attack
  • 相关文献

参考文献20

  • 1LEE J H and BONNIN J M ticket-based authentication HOTA: Handover optimized in network-based mobility management[J]. Information Sciences, 2013, 230(5): 64-77.
  • 2JIA X D, CHANG Y F, ZHANG Z Z, et al. A critique of a lightweight identity authentication protocol for vehicular network[J]. Journal of Information Hiding and Multimedia Signal Processing, 2015, 6(3): 183-188.
  • 3YANG X, HUANG X, HAN J, et al. Improved handover authentication and key pre-distribution for wireless mesh networksIJ]. Concurrency and Computation: Practice and Experience, 2015, 42(9): 621-628.
  • 4. XIAO P, HE J, and FU Y. An access authentication protocol for trusted handoff in wireless mesh networks[J]. Computer Standards & Interfaces, 2014, 36(3): 480-488.
  • 5CHOI H H. Ad hoc cooperative vertical handover for next- generation heterogeneous networks[J]. AEU-International Journalof Electronics and Communications, 2015, 69(10): 1557-1561.
  • 6HE D, CHEN C, CHAN S, et al. Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 2012, 11(1): 48-53.
  • 7TSAI J L, LO N W, and WU T C. Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 2013, 73(3): 1037-1047.
  • 8YEO S L, YAP W S, LIU J K, et al. Comments on "analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions" [J]. IEEE Communications Letters, 2013, 17(8): 1521-1523.
  • 9LI J S and LIU K H. A lightweight identity authentication protocol for vehicular networks[J]. Telecommunication Sustems. 2013.53(4: 425-438.
  • 10JURCUT A D, COFFEY T, and DOJEN R. Design guidelines for security protocols to prevent replay & parallel session attacks[J]. Computers & Security, 2014, 45(6): 255-273.

同被引文献8

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部