Browse > Article
http://dx.doi.org/10.3837/tiis.2019.02.006

A Relay-assisted Secure Handover Mechanism for High-speed Trains  

Zhao, Yue (Science and Technology on Communication Security Laboratory)
Tian, Bo (Science and Technology on Communication Security Laboratory)
Chen, Zhouguo (Science and Technology on Communication Security Laboratory)
Yang, Jin (College of Cyber Security, Sichuan University)
Li, Saifei (The School of Information Science and Technology, Southwest Jiaotong University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.2, 2019 , pp. 582-596 More about this Journal
Abstract
Considering that the existing Long Term Evolution is not suitable for the fast and frequent handovers of high-speed trains, this paper proposes a relay-assisted handover mechanism to solve the problems of long handover authentication time and vulnerable to security attacks. It can achieve mutual authentication for train-ground wireless communication, and data transmission is consistent with one-time pad at the same time. The security analysis, efficiency analysis and simulation results show that the proposed mechanism not only realizes the forward security and resists many common attacks, but also effectively reduces the computational overhead of train antenna during the secure handover process. When the running speed of a train is lower than 500km/h, the handover delay is generally lower than 50ms and the handover outage probability is less than 1.8%. When the running speed of a train is 350km/h, the throughput is higher than 16.4mbps in the process of handover. Therefore, the secure handover mechanism can improve the handover performance of high-speed trains.
Keywords
High-speed trains; Secure handover; Mutual authentication; Signcryption scheme; One-time pad;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. He, B Ai, G. Wang, K. Guan, Z. Zhong, A. Molisch, C. Briso-Rodriguez, C. Oestges, "High-speed railway communications: From GSM-R to LTE-R," IEEE Vehicular Technology Magazine, vol.11, no.3, pp: 49-58, 2016.   DOI
2 J. Lee, C. Jang, O. Yi, "Analysis of radio based train control system using LTE-R and analysis of security requirements: The security of the radio based train control system," in Proc. of International Conference on Computer Applications and Information Processing Technology, pp: 1-4, August 2017.
3 H. Song, X. Fang, L. Yan, "Handover scheme for 5G C/U plane split heterogeneous network in high-speed railway," IEEE Transactions on Vehicular Technology, vol.63, no.9, pp: 4633-4646, 2014.   DOI
4 L. Yan, X. Fang, Y. Fang, "Control and data signaling decoupled architecture for railway wireless networks," IEEE Wireless Communications, vol.22, no.1, pp: 103-111, 2015.   DOI
5 A. Jabir, S. Shamala, Z. Zuriati, N. Hamid, "Fast handoff scheme for cluster-based proxy mobile Ipv6 protocol," IEICE Transactions on Communications, vol.E97-B, no.8, pp: 1667-1678, 2014.   DOI
6 M. Almulla, Y. Wang, A. Boukerche, Z. Zhang, "A fast location-based handoff scheme for vehicular networks," IEEE International Conference on Communications, pp: 1464-1468, June 2013.
7 I. Lopez, M. Aguado, "Cyber security analysis of the European train control system," IEEE Communications Magazine, vol.53, no.10, pp: 110-116, 2015.   DOI
8 X. Wang, C. He. "Safety function design and application of CTCS on-board equipment in high-speed railway of China," in Proc. of International Conference on Electromagnetics in Advanced Applications, pp: 677-679, October 2017.
9 J. H. Lin, L. Liu, C. Yi, W. Y. Wu. "Research on evolution law of service performance of high-speed train based on tracking monitoring," in Proc. of IET Conference on Railway Condition Monitoring, pp: 1-8, September 2016.
10 Z. Pan, S. Liu, A. K. Sangaiah, K. Muhammad. "Visual attention feature (VAF): a novel strategy for visual tracking based on cloud platform in intelligent surveillance systems," Journal of Parallel & Distributed Computing, vol. 120, pp: 182-194, 2018.   DOI
11 Y. Li, Y. Qi, L. Lu, "Secure and efficient V2V communications for heterogeneous vehicle Ad Hoc networks," in Proc. of International Conference on Networking and Network Applications, pp: 93-99, October 2017.
12 E. Aqeeli, A. Moubayed, A. Shami. "Towards intelligent LTE mobility management through MME Pooling," in Proc. of IEEE Global Communications Conference, pp: 1-6, December 2015.
13 S. Li, L. Yan, "Enhanced robustness of control network for Chinese train control system level 3 (CTCS-3) facilitated by software defined networking," International Journal of Rail Transportation, vol.2, no.4, pp: 239-252, 2014.   DOI
14 Y. Zhao, B. Tian, Z. Chen, Y. Liu, J. Ding, "An energy-efficient key agreement mechanism for underwater sensor networks," iCatse Conference on IT Convergence and Security, pp: 146-158, September 2017.
15 S. Liu, X. Cheng, W. Fu, Y. Zhou, Q. Li, "Numeric characteristics of generalized M-set with its asymptote," Applied Mathematics & Computation, vol. 243, pp: 767-774, 2014.   DOI
16 Y. Zheng, H. Imai, "How to construct efficient signcryption schemes on elliptic curves," Information Processing Letters, vol. 68, no.5, pp: 227-233, 1998.   DOI
17 M. Abdeljebbar, R. Elkouch, "Security analysis of LTE/SAE networks over E-UTRAN," International Conference on Information Technology for Organizations Development, pp: 1-5, March 2016.
18 S. Liu, W. Fu, L. He, J Zhou, M Ma, "Distribution of primary additional errors in fractal encoding method," Multimedia Tools & Applications, vol. 76, no.4, pp: 5787-5802, 2017.   DOI
19 R Sanodiya, "DoS attacks: A simulation study," in Proc. of International Conference on Energy, Communication, Data Analytics and Soft Computing, pp: 2553-2558, August 2017.
20 Y. Zhao, X. Fang, R. Huang, Y. Fang, "Joint Interference Coordination and Load Balancing for OFDMA Multihop Cellular Networks," IEEE Transactions on Mobile Computing, vol.13, no.1, pp: 89-101, 2014.   DOI
21 P. A. Rohman, R. Indrawijaya, T. Miftahushudur, B. A. Wael, "Performance analysis of curve-shaped NLFM against Doppler effect and background noise," in Proc. of International Conference on Radar, Antenna, Microwave, Electronics and Telecommunications, pp: 54-58, October 2016.
22 H. Song, X. Fang, C. Wang, "Cost-reliability tradeoff in licensed and unlicensed spectra interoperable networks with guaranteed user data rate requirements," IEEE Journal on Selected Areas in Communications, vol.35, no.1, pp: 200-214, 2017.   DOI
23 Z. Haddad, M. Mahmoud, I. A. Saroit, S. Taha, "Secure and efficient uniform handover scheme for LTE-A networks," in Proc. of IEEE Wireless Communications and Networking Conference, pp: 1-6, September 2016.
24 W. Khedr, M. Abdalla, A. Elsheikh, "Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network," IET Information Security, vol. 9, no.6, pp: 334-343, 2015.   DOI
25 S. Zargar, J. Joshi, D. Tipper, "DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring," in Proc. of IEEE International Conference on Information Reuse and Integration, pp: 120-129, August 2014.