Abstract
This paper proposes a fast and efficient handover authentication with conditional privacy in V2I networks. One of the main challenges for achieving secure V2I communications is to accomplish a fast and efficient handover authentication for seamless IP-based services. Anonymous authentication with authority traceability is another important security issue. The basic idea is that a handover authentication occurs only between a vehicle and a roadside unit to reduce the cost of authentication time and communication overhead. After performing the handover authentication, the roadside unit notifies an AAA server of the authentication result and vehicle’s pseudonym ID, which does not affect the fast handover authentication. The proposed scheme is more efficient than the existing schemes in terms of authentication time and communication overhead. In addition, our work is the first study on conditional privacy preservation during a handover process in V2I networks.
This research is supported by the Ubiquitous Computing and Network (UCN) Project, Knowledge and Economy Frontier R&D Program of the Ministry of Knowledge Economy (MKE) in Korea as a result of UCN’s subproject 09C1-C1-20S, and partly supported by the Korea Science and Engineering Foundation (KOSEF) grant funded by the Korea government (MEST) (No. 2009-0053879).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IEEE Standard 1609.2-2006, IEEE Trial-use Standard for Wireless Access in Vehicular Environments - security services for applications and management messages (2006)
Mussabbir, Q., Yao, W., Niu, Z., Fu, Z.: Optimized FMIPv6 using IEEE 802.21 MIH services in vehicular networks. IEEE Trans. Veh. Technol. 56(6), 3397–3407 (2007)
Koodli, R.: Mobile IPv6 Fast Handovers, IETF RFC 5268 (2008)
McCann, Mobile IPv6 Fast Handovers for 802.11 Networks, IETF RFC 4260 (2005)
Jang, H., Jee, J., Han, Y., Park, S., Cha, J.: Mobile IPv6 Fast Handovers over IEEE 802.16e Networks, IETF RFC 5270 (2008)
Yokota, H., Dommety, G.: Mobile IPv6 Fast Handovers for 3G CDMA Networks, IETF RFC 5271 (2008)
ASTM E2213-03, Standard Specification for Telecommunications and Information Exchange Roadside and Vehicle Systems - 5GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2003)
IEEE 802.11i Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2004)
Mishra, A., Shin, M.H., Petroni Jr., N.L., Clancy, T.C., Arbaugh, W.A.: Proactive Key Distribution Using Neighbor Graphs. IEEE Wirel. Commun. 11(1), 26–36 (2004)
Pack, S., Choi, Y.: Fast handoff scheme based on mobility prediction in public wireless LAN systems. IEE Proc.-Commun. 151(5), 489–495 (2004)
Zhang, C., Lu, R., Ho, P., Chen, A.: A location privacy preserving authentication scheme in vehicular networks. In: Proc. WCNC 2008, pp. 2543–2548 (2008)
Kim, Y., Ren, W., Jo, J., Yang, M., Jiang, Y., Zheng, J.: SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography. In: Proc. ICC 2007, pp. 1570–1575 (2007)
MIRACL, Multiprecision Integer and Rational Arithmetic C/C++ library, http://www.shamus.ie
Petroni Jr., N.: An empirical analysis of the 4-way hand-shake. IEEE 802.11-03/0563-00-000i, http://www.drizzle.com/~aboba/IEEE
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Choi, J., Jung, S., Kim, Y., Yoo, M. (2009). A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks. In: Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds) Smart Spaces and Next Generation Wired/Wireless Networking. ruSMART NEW2AN 2009 2009. Lecture Notes in Computer Science, vol 5764. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04190-7_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-04190-7_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04188-4
Online ISBN: 978-3-642-04190-7
eBook Packages: Computer ScienceComputer Science (R0)