Wireless Personal Communications

, Volume 97, Issue 3, pp 3601–3618 | Cite as

An Improved Privacy-Aware Handoff Authentication Protocol for VANETs

  • Zhiping ZhouEmail author
  • Huigen Zhang
  • Ziwen Sun


Vehicles handover from one road-side unit to another is a common phenomenon in vehicular ad-hoc networks (VANETs). Authenticating vehicles effectively is the key to success of VANETs. Li and Liu et al. proposed a lightweight identity authentication protocol (LIAP) for VANTEs recently, which is based on the concept of dynamic session secret process instead of conventional cryptographic schemes. LIAP possesses many advantages of againsting major existing attacks and performing well at efficiency and low consumption. However, we have demonstrated that the protocol LIAP doesn’t provide user location privacy protection and the resistance of parallel session attack is weak. Therefore, to enhance security of the protocol LIAP, we concatenate the terminal’s pseudo-identity with a random number, then encrypt the connected information by using quadratic residues operation, the generated dynamic identity can against the user location tracking attack. Furthermore, in order to against the parallel session attack during the handover procedure, a new road side unit regenerated a new session secret sequence and computed a challenge sequence with the terminal user’s pseudo-identity through XOR encryption. Through security analysis and experiments, our scheme has higher efficiency and better performance to be applicable to VANETS compared with other existing schemes.


Vehicle network Handover authentication Quadratic residue theorem Privacy protection Parallel session attack 



This work is supported by the National Natural Science Foundation of China under Grant No. 61373126, and the Special Funds of Basic Research Business Expenses of Central University under Grant No. JUSRP51510.


  1. 1.
    Lee, J. H., & Bonnin, J. M. (2013). HOTA: Handover optimized ticket-based authentication in network-based mobility management[J]. Information Sciences, 230, 64–77.MathSciNetCrossRefGoogle Scholar
  2. 2.
    Jia, X. D., Chang, Y. F., Zhang, Z. Z., et al. (2015). A critique of a lightweight identity authentication protocol for vehicular network[J]. Journal of Information Hiding and Multimedia Signal Processing, 6(3), 183–188.Google Scholar
  3. 3.
    Yang, X., Huang, X., Han, J., et al. (2015). Improved handover authentication and key pre-distribution for wireless mesh networks[J]. Concurrency and Computation: Practice and Experience, 28, 10.Google Scholar
  4. 4.
    Xiao, P., He, J., & Fu, Y. (2014). An access authentication protocol for trusted handoff in wireless mesh networks[J]. Computer Standards & Interfaces, 36(3), 480–488.CrossRefGoogle Scholar
  5. 5.
    Choi, H. H. (2015). Ad hoc cooperative vertical handover for next-generation heterogeneous networks[J]. AEU-International Journal of Electronics and Communications, 69(10), 1557–1561.CrossRefGoogle Scholar
  6. 6.
    He, D., Chen, C., Chan, S., et al. (2012). Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRefGoogle Scholar
  7. 7.
    Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 73(3), 1037–1047.CrossRefGoogle Scholar
  8. 8.
    Yeo, S. L., Yap, W. S., Liu, J. K., et al. (2013). Comments on” analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions”[J]. Communications Letters, IEEE, 17(8), 1521–1523.CrossRefGoogle Scholar
  9. 9.
    Li, J. S., & Liu, K. H. (2013). A lightweight identity authentication protocol for vehicular networks[J]. Telecommunication Systems, 53(4), 425–438.MathSciNetCrossRefGoogle Scholar
  10. 10.
    Jurcut, A. D., Coffey, T., & Dojen, R. (2014). Design guidelines for security protocols to prevent replay & parallel session attacks[J]. Computers & Security, 45, 255–273.CrossRefGoogle Scholar
  11. 11.
    Zhang, Y., Chen, X., Li, J., et al. (2014). Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks[J]. Computer Networks, 75, 192–211.CrossRefGoogle Scholar
  12. 12.
    He, D., Bu, J., Chan, S. C., et al. (2013). Handauth: Efficient handover authentication with conditional privacy for wireless networks[J]. IEEE Transactions on Computers, 62(3), 616–622.MathSciNetCrossRefGoogle Scholar
  13. 13.
    Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks[J]. Sensors, 14(7), 11379–11394.CrossRefGoogle Scholar
  14. 14.
    He, D., Chan, S., & Guizani, M. (2015). Handover authentication for mobile networks: Security and efficiency aspects[J]. Network, IEEE, 29(3), 96–103.CrossRefGoogle Scholar
  15. 15.
    Yeh, L. Y., & Huang, J. L. (2014). PBS: A portable billing scheme with fine-grained access control for service-oriented vehicular networks[J]. IEEE Transactions on Mobile Computing, 13(11), 2606–2619.CrossRefGoogle Scholar
  16. 16.
    Wu, H. T., Yein, A. D., & Hsieh, W. S. (2015). Message authentication mechanism and privacy protection in the context of vehicular ad hoc networks[J]. Mathematical Problems in Engineering, 501, 569526.MathSciNetzbMATHGoogle Scholar
  17. 17.
    Guo, S., Zeng, D., & Xiang, Y. (2014). Chameleon hashing for secure and privacy-preserving vehicular communications[J]. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2794–2803.CrossRefGoogle Scholar
  18. 18.
    Cao, J., Li, H., Ma, M., et al. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks, 56(8), 2119–2131.CrossRefGoogle Scholar
  19. 19.
    Li, G., Jiang, Q., Wei, F., et al. (2015). A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 80(2), 581–589.CrossRefGoogle Scholar
  20. 20.
    Shamus Software Ltd. MIRACL Library[OL].,2012-02-17.

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Engineering Research Center of Internet of Things Technology Applications Ministry of EducationJiangnan UniversityWuxiChina

Personalised recommendations