Skip to main content
Log in

Mutual authentication for vehicular network in complex and uncertain driving

  • S.I. : Brain- Inspired computing and Machine learning for Brain Health
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

With the rapid development of big data and cloud computing, vehicular is connected to the Internet in the complex and uncertain driving environment. The rapid growth of the types of services used by vehicles has made the problem of inefficient of traditional driving environment architecture more and more obvious. The vehicle has to register and remember a large number of usernames and passwords to each server. Authentication schemes for multi-server architectures have been proposed and applied to a wide range of areas, but there has been little research on the Internet of vehicles. The long-term evolution for vehicle (LTE-V) is a wireless network architecture and can be used for cooperative communication in vehicular network. Communications and authentication for LTE-V have the high request in complex and uncertain driving environment. To meet the needs of complex and uncertain driving environments, this paper proposes a novel mutual authentication and the key agreement scheme (LEANDER) under multi-server architecture. In this scheme, elliptic curve is used to reduce the computational complexity, and a more concise authentication method is constructed. Random anonymity supports multi-server for two-way authentication and key agreement, so as to effectively protect the privacy of the vehicle. Moreover, it can be use BAN logic to prove and analyze the effectiveness of this scheme. The performance analysis results show that the proposed mutual authentication scheme is effective and more secure than other state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Li W, Ma X, Wu J et al (2017) Analytical model and performance evaluation of long-term evolution for vehicle safety services. IEEE Trans Veh Technol 66(3):1926–1939

    Article  Google Scholar 

  2. Cao J, Ma M, Li H et al (2014) A survey on security aspects for LTE and LTE-A networks. IEEE Commun Surv Tutor 16(1):283–302

    Article  Google Scholar 

  3. Sun W, Liu J, Zhang H (2017) When smart wearables meet intelligent vehicles: challenges and future directions. IEEE Wirel Commun 24(3):58–65

    Article  Google Scholar 

  4. Xu C, Huang X, Ma M et al (2017) A privacy-preserving and cross-domain group authentication scheme for vehicular in LTE-A networks. J Commun 12(11):604–610

    Article  Google Scholar 

  5. Cheng JJ, Cheng JL, Zhou MC et al (2015) Routing in internet of vehicles: a review. IEEE Trans Intell Transp Syst 16(5):2339–2352

    Article  Google Scholar 

  6. Özçevik ME, Canberk B, Duong TQ (2017) End to end delay modeling of heterogeneous traffic flows in software defined 5G networks. Ad Hoc Netw 60:26–39

    Article  Google Scholar 

  7. Sindhuja P, Kuwahara Y, Kumaki K et al (2016) A design of vehicular GPS and LTE antenna considering vehicular body effects. IEICE Trans Commun 99(4):894–904

    Article  Google Scholar 

  8. Xu C, Huang X, Ma M et al (2018) A secure and efficient message authentication scheme for vehicular networks based on LTE-V. KSII Trans Internet Inf Syst 12(6):2841–2860

    Google Scholar 

  9. Liu J, Kato N, Ma J et al (2015) Device-to-device communication in LTE-advanced networks: a survey. IEEE Commun Surv Tutor 17(4):1923–1940

    Article  Google Scholar 

  10. Islam SH (2014) A provably secure ID-based mutual authentication and key agreement scheme for mobile multi-server environment without ESL attack. Wirel Pers Commun 79(3):1975–1991

    Article  Google Scholar 

  11. Li X, Ma J, Wang W et al (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58(1–2):85–95

    Article  Google Scholar 

  12. Li CT, Lee CC, Weng CY et al (2015) A secure dynamic identity based authentication protocol with smart cards for multi-server architecture. J Inf Sci Eng 31(6):1975–1992

    Google Scholar 

  13. Kim Y, Lim H, Kim K et al (2017) A SDN-based distributed mobility management in LTE/EPC network. J Supercomput 73(7):2919–2933

    Article  Google Scholar 

  14. Ucar S, Ergen SC, Ozkasap O (2016) Multihop-cluster-based IEEE 802.11 p and LTE hybrid architecture for VANET safety message dissemination. IEEE Trans Veh Technol 65(4):2621–2636

    Article  Google Scholar 

  15. Li J, Wen M, Zhang T (2016) Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J 3(3):408–417

    Article  Google Scholar 

  16. Choi D, Choi HK, Lee SY (2015) A group-based security protocol for machine-type communications in LTE-advanced. Wirel Netw 21(2):405–419

    Article  Google Scholar 

  17. Cao J, Ma M, Li H (2015) GBAAM: group-based access authentication for MTC in LTE networks. Secur Commun Netw 8(17):3282–3299

    Article  Google Scholar 

  18. Qiu Y, Ma M, Wang X (2017) A proxy signature-based handover authentication scheme for LTE wireless networks. J Netw Comput Appl 83:63–71

    Article  Google Scholar 

  19. He D, Wang D (2015) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823

    Article  Google Scholar 

  20. Lai C, Lu R, Li H et al (2016) Secure machine-type communications in LTE networks. Wirel Commun Mob Comput 16(12):1495–1509

    Article  Google Scholar 

  21. Hsieh WB, Leu JS (2014) An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures. J Supercomput 70(1):133–148

    Article  Google Scholar 

  22. Amin R, Biswas GP (2015) Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment. Wirel Pers Commun 84(1):439–462

    Article  Google Scholar 

  23. He D, Zeadally S, Kumar N et al (2016) Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans Inf Forensics Secur 11(9):2052–2064

    Article  Google Scholar 

  24. Chen S, Hu J, Shi Y et al (2016) LTE-V: a TD-LTE-based V2X solution for future vehicular network. IEEE Int Things J 3(6):997–1005

    Article  Google Scholar 

  25. Fu A, Song J, Li S et al (2016) A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks. Secur Commun Netw 9(13):2002–2014

    Google Scholar 

  26. Shao C, Leng S, Zhang Y et al (2015) Performance analysis of connectivity probability and connectivity-aware MAC protocol design for platoon-based VANETs. IEEE Trans Veh Technol 64(12):5596–5609

    Article  Google Scholar 

  27. Cao J, Ma M, Li H et al (2018) EGHR: efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1–16

    Article  Google Scholar 

  28. Wu C, Yoshinaga T, Ji Y et al (2017) A reinforcement learning-based data storage scheme for vehicular ad hoc networks. IEEE Trans Veh Technol 66(7):6336–6348

    Article  Google Scholar 

  29. Liyanage KSK, Ma M, Chong PHJ (2018) Controller placement optimization in hierarchical distributed software defined vehicular networks. Comput Netw 135:226–239

    Article  Google Scholar 

  30. Zheng K, Zheng Q, Chatzimisios P et al (2015) Heterogeneous vehicular networking: a survey on architecture, challenges, and solutions. IEEE Commun Surv Tutor 17(4):2377–2396

    Article  Google Scholar 

  31. Tan H, Ma M, Labiod H et al (2016) A secure and authenticated key management protocol (SA-KMP) for vehicular networks. IEEE Trans Veh Technol 65(12):9570–9584

    Article  Google Scholar 

  32. Fu A, Qin N, Wang Y et al (2017) Nframe: a privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks. Wirel Netw 23(7):2165–2176

    Article  Google Scholar 

  33. Minelli M, Ma M, Coupechoux M et al (2016) Scheduling impact on the performance of relay-enhanced LTE-A networks. IEEE Trans Veh Technol 65(4):2496–2508

    Article  Google Scholar 

  34. Yang T, Lai C, Lu R et al (2015) EAPSG: efficient authentication protocol for secure group communications in maritime wideband communication networks. Peer-to-Peer Netw Appl 8(2):216–228

    Article  Google Scholar 

  35. Huang X, Xu C, Wang P et al (2018) LNSC: a security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access 6:13565–13574

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant No. 61871039), the Supporting Plan for Cultivating High Level Teachers in Colleges and Universities in Beijing (Grant No. IDHT20170511), the Talents Cultivation and Cooperation Oriented to Intelligent Vehicle Industrialization (Grant No. UK-CIAPP\324), Newton Fund Project supported by Royal Academy of Engineering of UK, the Joint Funds of National Natural Science Foundation of China and Xinjiang (Grant No. U1603261), and the National Key Technology R&D Program (Grant No. 2015BAH55F03).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongzhe Liu.

Ethics declarations

Conflict of interest

We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, C., Liu, H., Zhang, Y. et al. Mutual authentication for vehicular network in complex and uncertain driving. Neural Comput & Applic 32, 61–72 (2020). https://doi.org/10.1007/s00521-018-3743-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-018-3743-3

Keywords

Navigation