Skip to main content
Log in

Efficient User Based Authentication Protocol for Location Based Services Discovery Over Road Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In road network, the decision accuracy of event message under location privacy-enhanced scheme, fast forwarding falsification message, and collusion attacks are all knotty problems that arise in event trust management. In this paper, we proposed protocol verification to check vehicles activity in privacy manner. We proposed a new method to adjusted vehicles speed which reduces the vehicle delay suffers from network gap problem. We established privacy preserving authentication protocol to verify vehicle activities in the term of privacy preserving manner. Vehicles moving trend, velocity differences, and distance differences are taken into consideration so, to maintain as many common users as possible to reduce the cost. The cost analysis and performance evaluation indicate that our frame-work can reduced cost factor and achieve good performance. The proposed model achieved reliably and efficiently with packet rate information. The evaluation experiments based on NS-3 to our improve user’s authenticated key establishment protocol has comparatively shorter time response, reduce cost, less packet lost information and enhanced privacy preservation compared with existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Mukherjee, J. C., Agarwal, S., & Gupta, A. (2013). Distributed event notification in VANET with multiple service providers. In DEBS ‘14: Proceedings of the 8th ACM international conference on distributed event-based systems. May 2014.

  2. Chen, Z., Liu, Y., Wong, R, C-W., Xiong, J., Mai, G., & Long, C. (2014).Efficient algorithms for optimal location queries in road networks. In SIGMOD ‘14: Proceedings of the 2014 ACM SIGMOD international conference on management of data. June 2014.

  3. Memon, I., Domenic, K., Memon, H., Akhtar, R., Yong, W., & Zhang, F. (2014). Rumor riding: An anonymity approach for decentralized peer to peer systems. Wireless Personal Communications, 79, 647–660. doi:10.1007/s11277-014-1878-9.

    Article  Google Scholar 

  4. Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.

    Article  Google Scholar 

  5. Alsabaan, M., Alasmary, W., Albasir, A., & Naik, K. (2013). Road network for a greener environment: A survey. IEEE Communications Surveys & Tutorials, 15(3), 1372–1388.

    Article  Google Scholar 

  6. Moore, N. (2006). Optimistic duplicate address detection (DAD) for MZs. IETF RFC 4429.

  7. Das, A. K. (2015). A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. International Journal of Communication Systems. doi:10.1002/dac.2933.

    Google Scholar 

  8. Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a gsm system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79, 661–686. doi:10.1007/s11277-014-1879-8.

    Article  Google Scholar 

  9. Ghosh, U., & Datta, R. (2011). A secure dynamic IP configuration scheme for mobile ad hoc networks. Ad Hoc Networks, 9(7), 1327–1342.

    Article  Google Scholar 

  10. Wang, X., & Mu, Y. (2013). A secure MZs address configuration scheme for a MANET. Security and Communication Networks, 6(6), 777–789.

    Article  Google Scholar 

  11. Liu, A. X., & Khakpour, A. R. (2013). Quantifying and verifying reachability for access controlled networks. IEEE/ACM Transactions on Networking (TON), 21(2), 551.

    Article  Google Scholar 

  12. Won, M., & Stoleru, R. (2014). A low-stretch-guaranteed and lightweight geographic routing protocol for large-scale wireless sensor networks. Transactions on Sensor Networks (TOSN), 11(1), 18.

    Google Scholar 

  13. Škoberne, N., Maennel, O., Phillips, I., Bush, R., Zorz, J., & Ciglaric, M. (2014). IPv4 address sharing mechanism classification and tradeoff analysis. IEEE/ACM Transactions on Networking (TON), 22(2), 391.

    Article  Google Scholar 

  14. Jeong, Y.-S., Park, J. S., & Park, J. H. (2015). An efficient authentication system of smart device using multi factors in mobile cloud service architecture. International Journal of Communication Systems, 28(4), 659–674.

    Article  Google Scholar 

  15. Sun, H.-M., Chen, C.-H., Yeh, C.-W., & Chen, Y.-H. (2013). A collaborative routing protocol against routing disruptions in MANETs. Personal and Ubiquitous Computing, 17(5), 865.

    Article  Google Scholar 

  16. Shin, H., Talipov, E., & Cha, H. (2012). Spectrum: Lightweight hybrid address autoconfiguration protocol based on virtual coordinates for 6LoWPAN. IEEE Transactions on Mobile Computing, 11(11), 1749–1761.

    Article  Google Scholar 

  17. Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications, 80(4), 1347–1362.

    Article  Google Scholar 

  18. Talipov, E., Shin, H., Han, S., et al. (2011). Alightweight stateful address autoconfiguration for6LoWPAN. Wireless Network, 17(1), 183–197.

    Article  Google Scholar 

  19. Al-Mistarihi, M. F., Al-Shurman, M., & Qudaimat, A. (2011). Tree based dynamic address autoconfiguration in mobile ad hoc networks. Computer Networks, 55(8), 1894–1908.

    Article  Google Scholar 

  20. Mohandas, B. K., & Liscano, R. (2008). IP address configuration in VANET using centralized DHCP. In 33rd IEEE local computer networks conference (pp. 608–613).

  21. Coussement, R., Amar Bensaber, B., Biskri, I. (2013). Decision support protocol for intrusion detection in VANETs. In DIVANet ‘13: Proceedings of the third ACM international symposium on design and analysis of intelligent road network and applications.

  22. Wei, J., Hu, X., & Liu, W. (2014). Two-factor authentication scheme using attribute and password. International Journal of Communication Systems. doi:10.1002/dac.2915.

    Google Scholar 

  23. Xie, Q., Dong, N., Wong, D. S., & Hu, B. (2016). Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. International Journal of Communication Systems, 29(3), 478–487.

    Article  Google Scholar 

  24. BenMimoune, A., Khasawneh, F. A., Kadoch, M., Sun, S., & Rong, B. (2014).Inter-cell handoff performance improvement in LTE-a multi-hop relay networks. In MobiWac ‘14: Proceedings of the 12th ACM international symposium on mobility management and wireless access.

  25. Han, J., Lin, Y. -H., Perrig, A., & Bai, F. (2014). Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles. In WiSec ‘14: Proceedings of the 2014 ACM conference on security and privacy in wireless & mobile networks.

  26. Memon, I., Mangi, F. A., & Jamro, D. A. (2013). Collision Avoidance of Intelligent Service Robot for Industrial Security System. IJCSI International Journal of Computer Science Issues, 10(2), 3.

    Google Scholar 

  27. Memon, I. (2015). Authentication users privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications. doi:10.1007/s11277-015-2300-y.

    Google Scholar 

  28. Memon, I., Mangi, F. A., Jamro, D. A., Basit, M. A., & Memon, M. H. (2013). Rumor riding: Peer to peer systems. International Journal of Scientific & Engineering Research, 4(6).

  29. Hwang, T., & Gope, P. (2014). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets. Wireless Personal Communications, 77, 197–224. doi:10.1007/s11277-013-1501-5.

    Article  Google Scholar 

  30. Xiaonan, W., & Shan, Z. (2013). An MZs address configuration scheme for wireless sensor networks based on location information. Telecommunication Systems, 52(1), 151–160.

    Article  Google Scholar 

  31. Chang, B.-J., Liang, Y.-H., & Yang, H.-J. (2014). Performance analysis with traffic accident for cooperative active safety driving in VANET/ITS. Wireless Personal Communications, 74, 731–755. doi:10.1007/s11277-013-1318-2.

    Article  Google Scholar 

  32. Ying, B., Makrakis, D., & Mouftah, H. T. (2012). Privacy preserving broad cast message authentication protocol for VANETs. Journal of Network and Computer Applications, 36, 1352–1364.

    Article  Google Scholar 

  33. Kumar, R., & Dave, M. (2013). A framework for handling local broadcast storm using probabilistic data aggregation In VANET. Wireless Personal Communications, 72, 315–341. doi:10.1007/s11277-013-1016-0.

    Article  Google Scholar 

  34. Chena, Y.-S., Hsu, C.-S., & Yi, W.-H. (2012). An IP passing protocol for vehicular ad hoc networks with network fragmentation. Computers & Mathematics with Applications, 63(2), 407–426.

    Article  Google Scholar 

  35. Wang, X., Mu, Y., Han, G., & Le, D. (2014). A secure MZs address configuration protocol for road network. Wireless Personal Communications. doi:10.1007/s11277-014-1882-0.

    Google Scholar 

  36. Wu, X., Brown, K. N., Sreenan, C. J., Alvarez, P., Ruffini, M., Marchetti, N., Payne, D., & Doyle, L. (2013). An XG-PON module for the NS-3 network simulator. In SimuTools ‘13: Proceedings of the 6th international ICST conference on simulation tools and techniques.

  37. Mishraa, D., Chaturvedib, A., & Mukhopadhyayb, S. (2015). Design of a lightweight two-factor authentication scheme with smart card revocation. Journal of Information Security and Applications, 23, 44–53.

    Article  Google Scholar 

  38. Karapanos, N., Marforio, C., Soriente, C., & Čapkun, S. (2015). Sound-proof: usable two-factor authentication based on ambient sound. In Proceedings of the 24th USENIX conference on security symposium (pp. 483–498). Washington, D.C.

  39. Petsas, T., Tsirantonakis, G., Athanasopoulos, E., & Ioannidis, S. (2015). Two-factor authentication: is the world ready?: quantifying 2FA adoption. In Proceedings of the eighth european workshop on system security (pp. 1–7), April 21–21, 2015, Bordeaux, France.

  40. Jiang, Q., Ma, J., & Tian, Y. (2015). Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of. International Journal of Communication Systems, 28(7), 1340–1351.

    Article  Google Scholar 

  41. Shirvanian, M., Jarecki, S., Saxena, N., & Nathan, N. (2014). Two-factor authentication resilient to server compromise using mix-bandwidth devices. In The network and distributed system security symposium, NDSS ‘14.

  42. De Cristofaro, E., Du, H., Freudiger, J., & Norcie, G. A. (2014). comparative usability study of two-factor authentication. In Proceedings of the workshop on usable security (USEC).

  43. Grosse, E., & Upadhyay, M. (2013). Authentication at scale. IEEE Security and Privacy, 11(1), 15–22. doi:10.1109/MSP.2012.162.

    Article  Google Scholar 

  44. Khandelwal, N. S, & Kamboj, P. (2015).Two factor authentication using Visual Cryptography and Digital Envelope in Kerberos. In 2015 International conference on electrical, electronics, signals, communication and optimization (EESCO) (pp. 1–6).

  45. Chen, C.-T., & Lee, C.-C. (2015). A two-factor authentication scheme with anonymity for multi-server environments. Security and Communication Networks, 8(8), 1608–1625.

    Article  Google Scholar 

  46. Zhang, L., Tang, S., Chen, J., & Zhu, S. (2015). Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography. Wireless Personal Communications, 81(1), 53–75.

    Article  Google Scholar 

  47. Li, X., Niu*, J., Liao, J., & Liang, W. (2015). Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. International Journal of Communication Systems, 28(2), 374–382.

    Article  Google Scholar 

  48. Jiang, Q., Ma, J., Li, G., & Li, X. (2015). Improvement of robust smart-card-based password authentication scheme. International Journal of Communication Systems, 28(2), 383–393.

    Article  Google Scholar 

  49. Jiang, Q., Ma, J., & Tian, Y. (2015). Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol. International Journal of Communication Systems, 28(7), 1340–1351.

    Article  Google Scholar 

  50. Kumari*, S., & Khan, M. K. (2014). Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme’. International Journal of Communication Systems, 27(12), 3939–3955.

    Article  Google Scholar 

  51. Ma, C.-G., Wang, D., & Zhao, S.-D. (2014). Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems, 27(10), 2215–2227.

    Article  Google Scholar 

  52. Wei, J., Xuexian, H., & Liu, W. (2015). Two-factor authentication scheme using attribute and password. International Journal of Communication Systems, 28, 18.

    Google Scholar 

  53. Wang, D., & Wang, P. (2014). Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Networks, 20, 1.

    Article  Google Scholar 

  54. Yuan, J.-J. (2014). An enhanced two-factor user authentication in wireless sensor networks. Telecommunication Systems, 55(1), 105–113.

    Article  Google Scholar 

  55. MohammedBalfaqi, M. I., Nordin, R., Rahem, A. A., & Balfaqih, Z. (2017). Fast handover solution for network-based distributed mobility management in intelligent transportation systems. Telecommunication Systems, 64(2), 325–346.

    Article  Google Scholar 

  56. Zhang, L, Tang, S., & Zhu, S. (2016). Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol. Wireless Networks.

  57. Wang, Y., Xia, Y., Hou, J., Gao, S.-M., Nie, X., & Wang, Q. (2015). A fast privacy-preserving framework for continuous location-based queries in road networks. Journal of Network and Computer Applications, 53, 57.

    Article  Google Scholar 

  58. Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2015). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications, 80(1), 85–96.

    Article  Google Scholar 

  59. Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.

    Article  Google Scholar 

  60. Memon, M. H., Li, J. P., Memon, I., & Arain, Q. A. (2016). GEO matching regions: multiple regions of interests using content based image retrieval based on relative locations. Multimedia Tools and Applications, 1–35.

  61. Memon, M. H., Khan, A., Li, J. P., Shaikh, R. A., Memon, I., & Deep, S. (2014). Content based image retrieval based on geo-location driven image tagging on the social web. In Wavelet active media technology and information processing (ICCWAMTIP), 2014 11th international computer conference on (pp. 280–283). IEEE.

  62. Memon, I., & Arain, Q. A. (2016). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web, 1–34.

  63. Memon, M. H., Li, J. P., Memon, I., Shaikh, R. A., & Mangi, F. A. (2015). Efficient object identification and multiple regions of interest using CBIR based on relative locations and matching regions. In Wavelet active media technology and information processing (ICCWAMTIP), 2015 12th international computer conference on (pp. 247–250). IEEE.

  64. Arain, Q. A., Uqaili, M. A., Deng, Z., Memon, I., Jiao, J., Shaikh, M. A., et al. (2016). Clustering based energy efficient and communication protocol for multiple mix-zones over road networks. Wireless Personal Communications. doi:10.1007/s11277-016-3900-x.

  65. Arain, Q. A., Zhongliang, D., Memon, I., Arain, S., Shaikh, F. K., Zubedi, A., et al. (2016). Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Personal Communications. doi:10.1007/s11277-016-3906-4.

  66. Memon, I., Ali, Q., Zubedi, A., & Mangi, F. A. (2016). DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimedia Tools and Applications. doi:10.1007/s11042-016-4154-z.

  67. Kamenyi, D. M., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864.

    Google Scholar 

  68. Gustav, Y. H, Wang, Y., Domenic, M. K, Zhang, F., & Memon, I. (2013). Velocity similarity anonymization for continuous query location based services. In Computational problem-solving (ICCP), 2013 international conference on (pp. 433–436).

  69. Domenic, M. K, Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Preserving users’ privacy for continuous query services in road networks. In Information management, innovation management and industrial engineering conference.

  70. Akhtar, R., Leng, S., Wu, F., & Memon, I. (2013). Improvement of content delivery in mobile social networks. In Computational problem-solving (ICCP), 2013 international conference on (pp. 139–143).

Download references

Acknowledgement

We thank reviewers for their valuable comments/suggestions on the early version of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qasim Ali Arain.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Memon, I., Arain, Q.A., Memon, H. et al. Efficient User Based Authentication Protocol for Location Based Services Discovery Over Road Networks. Wireless Pers Commun 95, 3713–3732 (2017). https://doi.org/10.1007/s11277-017-4022-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4022-9

Keywords

Navigation