DOI QR코드

DOI QR Code

A Secure and Efficient Message Authentication Scheme for Vehicular Networks based on LTE-V

  • Xu, Cheng (Institute of Network Technology, Beijing University of Posts and Telecommunications) ;
  • Huang, Xiaohong (Institute of Network Technology, Beijing University of Posts and Telecommunications) ;
  • Ma, Maode (School of Electrical and Electronic Engineering, Nanyang Technological University) ;
  • Bao, Hong (Beijing Key Laboratory of Information Service Engineering, Beijing Union University)
  • Received : 2017.08.14
  • Accepted : 2018.01.24
  • Published : 2018.06.30

Abstract

Vehicular networks play an important role in current intelligent transportation networks and have gained much attention from academia and industry. Vehicular networks can be enhanced by Long Term Evolution-Vehicle (LTE-V) technology, which has been defined in a series of standards by the 3rd Generation Partnership Project (3GPP). LTE-V technology is a systematic and integrated V2X solution. To guarantee secure LTE-V communication, security and privacy issues must be addressed before the network is deployed. The present study aims to improve the security functionality of vehicular LTE networks by proposing an efficient and secure ID-based message authentication scheme for vehicular networks, named the ESMAV. We demonstrate its ability to simultaneously support both mutual authentication and privacy protection. In addition, the ESMAV exhibit better performance in terms of overhead computation, communication cost, and security functions, which includes privacy preservation and non-frameability.

Keywords

References

  1. J. Cao, M. Ma, H. Li, Y. Zhang, and Z. Luo, "A Survey on Security Aspects for LTE and LTE-A Networks," Communications Surveys & Tutorials IEEE, vol. 16, pp. 283-302, 2014. https://doi.org/10.1109/SURV.2013.041513.00174
  2. J. Cheng, J. Cheng, M. Zhou, F. Liu, S. Gao, and C. Liu, "Routing in Internet of Vehicles: A Review," IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, vol. 16, pp. 2339-2352, 2015. https://doi.org/10.1109/TITS.2015.2423667
  3. M. H. Lin and Y. W. Chen, "Performance Analysis of Buffer Aware Scheduling for Video Services in LTE Network," KSII Transactions on Internet & Information Systems, vol. 9, pp. 3594-3610, 2015.
  4. D. He, S. Chan and M. Guizani, "Securing software defined wireless networks," IEEE Communications Magazine, vol. 54, pp. 20-25, 2016.
  5. G. Araniti, C. Campolo, M. Condoluci, A. Iera, and A. Molinaro, "LTE for Vehicular Networking: A Survey," IEEE COMMUNICATIONS MAGAZINE, vol. 51, pp. 148-157, 2013.
  6. D. P. Van, B. P. Rimal, S. Andreev, and T. Tirronen, "Machine-to-Machine Communications Over FiWi Enhanced LTE Networks: A Power-Saving Framework and End-to-End Performance," Journal of Lightwave Technology, vol. 34, pp. 1062-1071, 2016. https://doi.org/10.1109/JLT.2015.2510358
  7. K. Kanwal and G. A. Safdar, "Reduced Early Handover for Energy Saving in LTE Networks," Communications Letters IEEE, vol. 20, pp. 153-156, 2016. https://doi.org/10.1109/LCOMM.2015.2503280
  8. M. Condoluci, M. Dohler, G. Araniti, and A. Molinaro, "Enhanced Radio Access and Data Transmission Procedures Facilitating Industry-Compliant Machine-Type Communications over LTE-Based 5G Networks," IEEE Wireless Communications, vol. 23, pp. 56-63, 2016. https://doi.org/10.1109/MWC.2016.7422406
  9. R. Hemajanani, R. Perumalraja and S. Chowmya, "Software defined LTE vehicular network," International Journal of Applied Engineering Research, vol. 10, pp. 1812-1816, 2015.
  10. T. H. Chuang, M. H. Tsai and C. Y. Chuang, "Group-Based Uplink Scheduling for Machine-Type Communications in LTE-Advanced Networks," in Proc. of IEEE International Conference on Advanced Information NETWORKING and Applications Workshops, 2015, pp. 652-657.
  11. D. Choi, H. K. Choi and S. Y. Lee, "A group-based security protocol for machine-type communications in LTE-advanced," Wireless Networks, vol. 21, pp. 405-419, 2015. https://doi.org/10.1007/s11276-014-0788-9
  12. C. Lai, H. Li, R. Lu, and X. Shen, "SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks," Computer Networks, vol. 57, pp. 3492-3510, 2013. https://doi.org/10.1016/j.comnet.2013.08.003
  13. C. Lai, H. Li, R. Lu, and R. Jiang, "LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks," in Proc. of GLOBECOM 2013 - 2013 IEEE Global Communications Conference, 2013, pp. 832-837.
  14. C. Lai, R. Lu, D. Zheng, H. Li, and X. Shen, "GLARM: Group-based Lightweight Authentication Scheme for Resource-constrained Machine to Machine Communications," Computer Networks, vol. 99, pp. 66-81, 2016. https://doi.org/10.1016/j.comnet.2016.02.007
  15. P. Sindhuja, Y. Kuwahara, K. Kumaki, and Y. Hiramatsu, "A Design of Vehicular GPS and LTE Antenna Considering Vehicular Body Effects," Ieice Transactions on Communications, vol. 99, 2016.
  16. W. Li, X. Ma, J. Wu, K. S. Trivedi, and X. L. Huang, "Analytically Modelling and Performance Evaluation of Long Term Evolution for Vehicle (LTE-V) Safety Services," IEEE Transactions on Vehicular Technology, 2016.
  17. A. Fu, J. Song, S. Li, G. Zhang, and Y. Zhang, "A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks," Security & Communication Networks, vol. 9, pp. 2002-2014, 2016.
  18. Y. Qiu, M. Ma and X. Wang, "A proxy signature-based handover authentication scheme for LTE wireless networks," Journal of Network & Computer Applications, vol. 83, pp. 63-71, 2017. https://doi.org/10.1016/j.jnca.2017.01.023
  19. Y. Xie, L. B. Wu, J. Shen, and A. Alelaiwi, "EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs," Telecommunication Systems, pp. 1-12, 2016.
  20. K. A. Shim, "CPAS:An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks," IEEE Transactions on Vehicular Technology, vol. 61, pp. 1874-1883, 2012. https://doi.org/10.1109/TVT.2012.2186992
  21. C. C. Lee and Y. M. Lai, "Toward a secure batch verification with group testing for VANET," Wireless Networks, vol. 19, pp. 1441-1449, 2013. https://doi.org/10.1007/s11276-013-0543-7
  22. Z. Jianhong, X. Min and L. Liying, "On the security of a secure batch verification with group testing for VANET," International Journal of Network Security, vol. 16, pp. 355-362, 2014.
  23. M. Bayat, M. Barmshoory, M. Rahimi, and M. R. Aref, "A secure authentication scheme for VANETs with batch verification," Wireless Networks, vol. 21, pp. 1-11, 2015. https://doi.org/10.1007/s11276-014-0766-2
  24. D. He, S. Zeadally, B. Xu, and X. Huang, "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks," IEEE Transactions on Information Forensics & Security, vol. 10, p. 1-1, 2015. https://doi.org/10.1109/TIFS.2014.2377671
  25. S. Chen, J. Hu, Y. Shi, and L. Zhao, "LTE-V: A TD-LTE based V2X Solution for Future Vehicular Network," IEEE Internet of Things Journal, vol. PP, p. 1-1, 2016.
  26. Y. L. Tseng, "LTE-Advanced enhancement for vehicular communication," IEEE Wireless Communications, vol. 22, pp. 4-7, 2015.
  27. C. K. Han and H. K. Choi, "Security Analysis of Handover Key Management in 4G LTE/SAE Networks," IEEE Transactions on Mobile Computing, vol. 13, pp. 457-468, 2014. https://doi.org/10.1109/TMC.2012.242
  28. J. Calabuig, J. F. Monserrat, D. Gozalvez, and O. Klemp, "Safety on the Roads: LTE Alternatives for Sending ITS Messages," Vehicular Technology Magazine IEEE, vol. 9, pp. 61-70, 2014. https://doi.org/10.1109/MVT.2014.2362272
  29. T. Yang, C. Lai, R. Lu, and R. Jiang, "EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks," Peer-to-Peer Networking and Applications, vol. 8, pp. 216-228, 2015. https://doi.org/10.1007/s12083-014-0251-9
  30. X. Duan and X. Wang, "Authentication handover and privacy protection in 5G hetnets using software-defined networking," IEEE Communications Magazine, vol. 53, pp. 28-35, 2015.
  31. A. G. Gotsis, A. S. Lioumpas and A. Alexiou, "M2M Scheduling over LTE: Challenges and new Perspectives," IEEE Vehicular Technology Magazine, vol. 7, pp. 34-39, 2012.
  32. A. Fu, N. Qin, Y. Wang, Q. Li, and G. Zhang, "Nframe : A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks," Wireless Networks, pp. 1-12, 2016.
  33. MIRACL Library, 2017.

Cited by

  1. STEIM: A Spatiotemporal Event Interaction Model in V2X Systems Based on a Time Period and a Raster Map vol.2020, pp.None, 2018, https://doi.org/10.1155/2020/1375426