Beruflich Dokumente
Kultur Dokumente
Cheng Xu Maode Ma
Institute of Network Technology School of Electrical and Electronic Engineering
Beijing University of Posts and Telecommunications Nanyang Technological University
Beijing, China Singapore
e-mail: xc-f4@163.com
Abstract—The intelligent transportation systems and vehicular Evolution-Advanced (LTE-A) networks. A series of
networking concepts arises at the historic moment. LTE-A authentication scheme in [3] based on privacy protection,
research and development of vehicular networking has these solutions are used to handle traffic information sharing
important significance. When a mass of vehicle devices are problems in VANET, and they all adopt direct information
accessed to the LTE-A network simultaneously with a full interaction on vehicle to vehicle (V2V) to communicate.
authentication and key agreement process for each device, the This way not only caused by repeated authentication
communication signaling would congest the network. In this information, and vulnerable to denial of service attacks and
paper, we proposed a cross-domain group authentication other problems. In order to solve this problem, use such as
scheme. It can effectively solve the security problems.
Group Signature (GS) and identity-based Signature (IS)
Theoretical analysis and experimental results are shown that
compared with other authentication protocol, our scheme has
method in [4] to construct privacy protection and
more security properties and better performance certification scheme. Group signature method which make
use of the sender's private key to anonymous signature of the
Keywords-LTE-A; vehicular network; cross-domain; group message, the receiver is using the group public key to verify
authentication; key agreement the message.
The earlier schemes in [5] that are unlikely to provide
user anonymity due to inherent design flaws are also
I. INTRODUCTION
susceptible to playback and simulated attacks. They then
Vehicle Ad hoc Networks (VANET) is the important built a powerful user authentication scheme for a wireless
basis of intelligent transportation services, as well as the smart card. However, a group-based security protocol for
most critical vehicular networking technology. At present, machine-type communications in [6] show that the scheme
the main countries and regions in the world based on lacks user friendliness and cannot provide user anonymity
IEEE802.11p technology have establishment Dedicated and unfairness in key agreement. Reanalyzed the
Short Range Communications (DSRC) technical standard. In authentication scheme in [7], it point out that their scheme
the next period of time restricts the development of vehicular also fails to achieve user anonymity and perfect forward
network [1]. secrecy, and discloses a legitimate user's password. They
Due to hundreds of vehicle devices in the VANET access then proposed an enhanced anonymous authentication
and management, the huge amounts of data and information, scheme for a roaming service in global mobile networks. A
a large number of heterogeneous networks. The application pseudo random and group signature scheme in [8] with the
of many complex business and user group of the existence, combination. The scheme assigned each vehicle is a group
these demands and vehicles make network security is facing signature private key, it load to reduce the message
more serious challenges. Thus, a heterogeneous network authentication, but there is still a huge problem in the
security communication and real-time and efficient cross- verification certificate revocation list of group signature. A
realm authentication information sharing at the same time are data fusion method in [9] can improve the efficiency of
the key and difficult problem to solve. One of the most traffic information sharing problems in VANET, but for
important is the transmission data effectively protect users' security issues such as privacy, it is still a lack of proper
private information [2]. solutions.
There are also some research works on group Above all scheme is initiated by the vehicle itself and to
authentication and key agreement protocol in Long Term self-validation of traffic information. These solutions directly
III. THE PROPOSED SCHEME sTA=αH(IDVi), and pass it to Vi. RSU sends its true identity
We propose a group of cross-domain authentication key and information to TA. And TA sRi=αH(IDRi) obtained the
agreement protocol can be divided into: system initialization, identity of the private key, and pass the private key to Vi. TA
group authentication phase, OBU and RSU key agreement save the OBU and RSU sends information and the
phase. The overall structure of the scheme as follows. corresponding private key.
Step 3: TA decrypting C1 restore message {r1, IDVi}. then part of the solution in computing performance. Therefore, we
through the Verify IDVi (c1, σ1) and Verify IDRx (c2, σ3) to only compute send or collection operation of traffic
verify the signature is valid. If the signature of the two information.
validation is effective, means that the demand is legal by The experiment hardware equipped with Intel Core 2
vehicles and roadside units. Therefore, TA with its own Duo (TM) CPU@2.4GHz processor. The simulation tool is
private key splicing the message of the r1||IDRx, and matlab2014b. After 100 times in operation of the experiment,
computing signature as in (5). Then send a new signature σ3 to obtain the average of these operations, Tmul Tpar, Th, Tmac,
to roadside unit Rx Tenc, Tdec operations such as the average length of 5.5ms and
41.1ms, 8us, 19.3us, 18.5us, 43.6us. as shown in Table Ċ.
³3=SignsTA˄r1||IDRx˅ All of the following simulation operations are conducted on
Step 4: once received signature σ3, the Rx send identity the basis of the results.
information IDRx and signature to vehicle Vi. It is clear that from Fig. 2. The handover consumption
Step 5: when messages are received, Vi verify whetherσ3 compare indicate that our scheme is has more security
is valid signature. If it is effective, this entity authentication properties and better performance. Under a 50% probability
process is complete. Then, Vi select a random number aę of successful attacks, the proposed scheme’s time
Zq*. Use Rx and the identity of the private key as the secret consumption is obviously less than that for ABAKA [10] and
key computing c2=IBEncIDRx(aP||IDVi), then forwarding LGTH [4].
message c2 to Rx. TABLE II. PERFORMANCE COMPARISON OF DIFFERENT SCHEME
Step 6: Rx decryption c2 and use IBEncIDRx (c2) to decrypt
the aP||IDVi. If verification through, then select a random Notation ABAKA[10] LGTH[4] Our scheme
number bęZq*, computing signature as in (6). then sends Message
Tmac+Tmul Tmac Tmac+Tenc
the message {bP, σ3} to Vi. sent
Message
2Tmac+2Tmul Tmac+Th Tmac+Tdec
σ3=SignsRx˄aP||bP˅ (6) transmission
[2] B. T. Sharef, R. A. Alsaqour and M. Ismail, "Vehicular [8] T. M. Lin, C. H. Lee, J. P. Cheng, and W. T. Chen, "PRADA:
communication ad hoc routing protocols: A survey," Journal of Prioritized Random Access With Dynamic Access Barring for MTC
Network & Computer Applications, vol. 40, pp. 363-396, 2014. in 3GPP LTE-A Networks," IEEE Transactions on Vehicular
[3] J. Cao, M. Ma, H. Li, Y. Zhang, and Z. Luo, "A Survey on Security Technology, vol. 63, pp. 2467-2472, 2014.
Aspects for LTE and LTE-A Networks," Communications Surveys & [9] R. Jiang, C. Lai, J. Luo, X. Wang, and H. Wang, "EAP-Based Group
Tutorials IEEE, vol. 16, pp. 283-302, 2014. Authentication and Key Agreement Protocol for Machine-Type
[4] Lai, H. Li, R. Lu, and R. Jiang, "LGTH: A lightweight group Communications," International Journal of Distributed Sensor
authentication protocol for machine-type communication in LTE Networks, vol. 2013, 2013.
networks," in GLOBECOM 2013 - 2013 IEEE Global [10] J. L. Huang, L. Y. Yeh and H. Y. Chien, "ABAKA: An Anonymous
Communications Conference, 2013, pp. 832-837. Batch Authenticated and Key Agreement Scheme for Value-Added
[5] J. Cao, M. Ma and H. Li, "GBAAM: group ̺ based access Services in Vehicular Ad Hoc Networks," IEEE Transactions on
authentication for MTC in LTE networks," Security & Vehicular Technology, vol. 60, pp. 248-262, 2011.
Communication Networks, 2015. [11] Fu, N. Qin, Y. Wang, Q. Li, and G. Zhang, "Nframe : A privacy-
[6] Choi, H. K. Choi and S. Y. Lee, "A group-based security protocol for preserving with non-frameability handover authentication protocol
machine-type communications in LTE-advanced," Wireless Networks, based on ( t , n ) secret sharing for LTE/LTE-A networks," Wireless
vol. 21, pp. 405-419, 2015. Networks, pp. 1-12, 2016.
[7] Lai, H. Li, R. Lu, and X. Shen, "SE-AKA: A secure and efficient [12] Wen F, Susilo W, Yang G. A Secure and Effective Anonymous User
group authentication and key agreement protocol for LTE networks," Authentication Scheme for Roaming Service in Global Mobility
Computer Networks, vol. 57, pp. 3492-3510, 2013. Networks[J]. Wireless Personal Communications, 2013, 78(3):247-
269.