Skip to main content

A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks

  • Conference paper
Smart Spaces and Next Generation Wired/Wireless Networking (ruSMART 2009, NEW2AN 2009)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5764))

Abstract

This paper proposes a fast and efficient handover authentication with conditional privacy in V2I networks. One of the main challenges for achieving secure V2I communications is to accomplish a fast and efficient handover authentication for seamless IP-based services. Anonymous authentication with authority traceability is another important security issue. The basic idea is that a handover authentication occurs only between a vehicle and a roadside unit to reduce the cost of authentication time and communication overhead. After performing the handover authentication, the roadside unit notifies an AAA server of the authentication result and vehicle’s pseudonym ID, which does not affect the fast handover authentication. The proposed scheme is more efficient than the existing schemes in terms of authentication time and communication overhead. In addition, our work is the first study on conditional privacy preservation during a handover process in V2I networks.

This research is supported by the Ubiquitous Computing and Network (UCN) Project, Knowledge and Economy Frontier R&D Program of the Ministry of Knowledge Economy (MKE) in Korea as a result of UCN’s subproject 09C1-C1-20S, and partly supported by the Korea Science and Engineering Foundation (KOSEF) grant funded by the Korea government (MEST) (No. 2009-0053879).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE Standard 1609.2-2006, IEEE Trial-use Standard for Wireless Access in Vehicular Environments - security services for applications and management messages (2006)

    Google Scholar 

  2. Mussabbir, Q., Yao, W., Niu, Z., Fu, Z.: Optimized FMIPv6 using IEEE 802.21 MIH services in vehicular networks. IEEE Trans. Veh. Technol. 56(6), 3397–3407 (2007)

    Article  Google Scholar 

  3. Koodli, R.: Mobile IPv6 Fast Handovers, IETF RFC 5268 (2008)

    Google Scholar 

  4. McCann, Mobile IPv6 Fast Handovers for 802.11 Networks, IETF RFC 4260 (2005)

    Google Scholar 

  5. Jang, H., Jee, J., Han, Y., Park, S., Cha, J.: Mobile IPv6 Fast Handovers over IEEE 802.16e Networks, IETF RFC 5270 (2008)

    Google Scholar 

  6. Yokota, H., Dommety, G.: Mobile IPv6 Fast Handovers for 3G CDMA Networks, IETF RFC 5271 (2008)

    Google Scholar 

  7. ASTM E2213-03, Standard Specification for Telecommunications and Information Exchange Roadside and Vehicle Systems - 5GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2003)

    Google Scholar 

  8. IEEE 802.11i Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2004)

    Google Scholar 

  9. Mishra, A., Shin, M.H., Petroni Jr., N.L., Clancy, T.C., Arbaugh, W.A.: Proactive Key Distribution Using Neighbor Graphs. IEEE Wirel. Commun. 11(1), 26–36 (2004)

    Article  Google Scholar 

  10. Pack, S., Choi, Y.: Fast handoff scheme based on mobility prediction in public wireless LAN systems. IEE Proc.-Commun. 151(5), 489–495 (2004)

    Article  Google Scholar 

  11. Zhang, C., Lu, R., Ho, P., Chen, A.: A location privacy preserving authentication scheme in vehicular networks. In: Proc. WCNC 2008, pp. 2543–2548 (2008)

    Google Scholar 

  12. Kim, Y., Ren, W., Jo, J., Yang, M., Jiang, Y., Zheng, J.: SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography. In: Proc. ICC 2007, pp. 1570–1575 (2007)

    Google Scholar 

  13. MIRACL, Multiprecision Integer and Rational Arithmetic C/C++ library, http://www.shamus.ie

  14. Petroni Jr., N.: An empirical analysis of the 4-way hand-shake. IEEE 802.11-03/0563-00-000i, http://www.drizzle.com/~aboba/IEEE

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, J., Jung, S., Kim, Y., Yoo, M. (2009). A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks. In: Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds) Smart Spaces and Next Generation Wired/Wireless Networking. ruSMART NEW2AN 2009 2009. Lecture Notes in Computer Science, vol 5764. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04190-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04190-7_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04188-4

  • Online ISBN: 978-3-642-04190-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics