Abstract
In road network, the decision accuracy of event message under location privacy-enhanced scheme, fast forwarding falsification message, and collusion attacks are all knotty problems that arise in event trust management. In this paper, we proposed protocol verification to check vehicles activity in privacy manner. We proposed a new method to adjusted vehicles speed which reduces the vehicle delay suffers from network gap problem. We established privacy preserving authentication protocol to verify vehicle activities in the term of privacy preserving manner. Vehicles moving trend, velocity differences, and distance differences are taken into consideration so, to maintain as many common users as possible to reduce the cost. The cost analysis and performance evaluation indicate that our frame-work can reduced cost factor and achieve good performance. The proposed model achieved reliably and efficiently with packet rate information. The evaluation experiments based on NS-3 to our improve user’s authenticated key establishment protocol has comparatively shorter time response, reduce cost, less packet lost information and enhanced privacy preservation compared with existing methods.
Similar content being viewed by others
References
Mukherjee, J. C., Agarwal, S., & Gupta, A. (2013). Distributed event notification in VANET with multiple service providers. In DEBS ‘14: Proceedings of the 8th ACM international conference on distributed event-based systems. May 2014.
Chen, Z., Liu, Y., Wong, R, C-W., Xiong, J., Mai, G., & Long, C. (2014).Efficient algorithms for optimal location queries in road networks. In SIGMOD ‘14: Proceedings of the 2014 ACM SIGMOD international conference on management of data. June 2014.
Memon, I., Domenic, K., Memon, H., Akhtar, R., Yong, W., & Zhang, F. (2014). Rumor riding: An anonymity approach for decentralized peer to peer systems. Wireless Personal Communications, 79, 647–660. doi:10.1007/s11277-014-1878-9.
Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.
Alsabaan, M., Alasmary, W., Albasir, A., & Naik, K. (2013). Road network for a greener environment: A survey. IEEE Communications Surveys & Tutorials, 15(3), 1372–1388.
Moore, N. (2006). Optimistic duplicate address detection (DAD) for MZs. IETF RFC 4429.
Das, A. K. (2015). A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. International Journal of Communication Systems. doi:10.1002/dac.2933.
Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a gsm system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79, 661–686. doi:10.1007/s11277-014-1879-8.
Ghosh, U., & Datta, R. (2011). A secure dynamic IP configuration scheme for mobile ad hoc networks. Ad Hoc Networks, 9(7), 1327–1342.
Wang, X., & Mu, Y. (2013). A secure MZs address configuration scheme for a MANET. Security and Communication Networks, 6(6), 777–789.
Liu, A. X., & Khakpour, A. R. (2013). Quantifying and verifying reachability for access controlled networks. IEEE/ACM Transactions on Networking (TON), 21(2), 551.
Won, M., & Stoleru, R. (2014). A low-stretch-guaranteed and lightweight geographic routing protocol for large-scale wireless sensor networks. Transactions on Sensor Networks (TOSN), 11(1), 18.
Škoberne, N., Maennel, O., Phillips, I., Bush, R., Zorz, J., & Ciglaric, M. (2014). IPv4 address sharing mechanism classification and tradeoff analysis. IEEE/ACM Transactions on Networking (TON), 22(2), 391.
Jeong, Y.-S., Park, J. S., & Park, J. H. (2015). An efficient authentication system of smart device using multi factors in mobile cloud service architecture. International Journal of Communication Systems, 28(4), 659–674.
Sun, H.-M., Chen, C.-H., Yeh, C.-W., & Chen, Y.-H. (2013). A collaborative routing protocol against routing disruptions in MANETs. Personal and Ubiquitous Computing, 17(5), 865.
Shin, H., Talipov, E., & Cha, H. (2012). Spectrum: Lightweight hybrid address autoconfiguration protocol based on virtual coordinates for 6LoWPAN. IEEE Transactions on Mobile Computing, 11(11), 1749–1761.
Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications, 80(4), 1347–1362.
Talipov, E., Shin, H., Han, S., et al. (2011). Alightweight stateful address autoconfiguration for6LoWPAN. Wireless Network, 17(1), 183–197.
Al-Mistarihi, M. F., Al-Shurman, M., & Qudaimat, A. (2011). Tree based dynamic address autoconfiguration in mobile ad hoc networks. Computer Networks, 55(8), 1894–1908.
Mohandas, B. K., & Liscano, R. (2008). IP address configuration in VANET using centralized DHCP. In 33rd IEEE local computer networks conference (pp. 608–613).
Coussement, R., Amar Bensaber, B., Biskri, I. (2013). Decision support protocol for intrusion detection in VANETs. In DIVANet ‘13: Proceedings of the third ACM international symposium on design and analysis of intelligent road network and applications.
Wei, J., Hu, X., & Liu, W. (2014). Two-factor authentication scheme using attribute and password. International Journal of Communication Systems. doi:10.1002/dac.2915.
Xie, Q., Dong, N., Wong, D. S., & Hu, B. (2016). Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. International Journal of Communication Systems, 29(3), 478–487.
BenMimoune, A., Khasawneh, F. A., Kadoch, M., Sun, S., & Rong, B. (2014).Inter-cell handoff performance improvement in LTE-a multi-hop relay networks. In MobiWac ‘14: Proceedings of the 12th ACM international symposium on mobility management and wireless access.
Han, J., Lin, Y. -H., Perrig, A., & Bai, F. (2014). Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles. In WiSec ‘14: Proceedings of the 2014 ACM conference on security and privacy in wireless & mobile networks.
Memon, I., Mangi, F. A., & Jamro, D. A. (2013). Collision Avoidance of Intelligent Service Robot for Industrial Security System. IJCSI International Journal of Computer Science Issues, 10(2), 3.
Memon, I. (2015). Authentication users privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications. doi:10.1007/s11277-015-2300-y.
Memon, I., Mangi, F. A., Jamro, D. A., Basit, M. A., & Memon, M. H. (2013). Rumor riding: Peer to peer systems. International Journal of Scientific & Engineering Research, 4(6).
Hwang, T., & Gope, P. (2014). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets. Wireless Personal Communications, 77, 197–224. doi:10.1007/s11277-013-1501-5.
Xiaonan, W., & Shan, Z. (2013). An MZs address configuration scheme for wireless sensor networks based on location information. Telecommunication Systems, 52(1), 151–160.
Chang, B.-J., Liang, Y.-H., & Yang, H.-J. (2014). Performance analysis with traffic accident for cooperative active safety driving in VANET/ITS. Wireless Personal Communications, 74, 731–755. doi:10.1007/s11277-013-1318-2.
Ying, B., Makrakis, D., & Mouftah, H. T. (2012). Privacy preserving broad cast message authentication protocol for VANETs. Journal of Network and Computer Applications, 36, 1352–1364.
Kumar, R., & Dave, M. (2013). A framework for handling local broadcast storm using probabilistic data aggregation In VANET. Wireless Personal Communications, 72, 315–341. doi:10.1007/s11277-013-1016-0.
Chena, Y.-S., Hsu, C.-S., & Yi, W.-H. (2012). An IP passing protocol for vehicular ad hoc networks with network fragmentation. Computers & Mathematics with Applications, 63(2), 407–426.
Wang, X., Mu, Y., Han, G., & Le, D. (2014). A secure MZs address configuration protocol for road network. Wireless Personal Communications. doi:10.1007/s11277-014-1882-0.
Wu, X., Brown, K. N., Sreenan, C. J., Alvarez, P., Ruffini, M., Marchetti, N., Payne, D., & Doyle, L. (2013). An XG-PON module for the NS-3 network simulator. In SimuTools ‘13: Proceedings of the 6th international ICST conference on simulation tools and techniques.
Mishraa, D., Chaturvedib, A., & Mukhopadhyayb, S. (2015). Design of a lightweight two-factor authentication scheme with smart card revocation. Journal of Information Security and Applications, 23, 44–53.
Karapanos, N., Marforio, C., Soriente, C., & Čapkun, S. (2015). Sound-proof: usable two-factor authentication based on ambient sound. In Proceedings of the 24th USENIX conference on security symposium (pp. 483–498). Washington, D.C.
Petsas, T., Tsirantonakis, G., Athanasopoulos, E., & Ioannidis, S. (2015). Two-factor authentication: is the world ready?: quantifying 2FA adoption. In Proceedings of the eighth european workshop on system security (pp. 1–7), April 21–21, 2015, Bordeaux, France.
Jiang, Q., Ma, J., & Tian, Y. (2015). Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of. International Journal of Communication Systems, 28(7), 1340–1351.
Shirvanian, M., Jarecki, S., Saxena, N., & Nathan, N. (2014). Two-factor authentication resilient to server compromise using mix-bandwidth devices. In The network and distributed system security symposium, NDSS ‘14.
De Cristofaro, E., Du, H., Freudiger, J., & Norcie, G. A. (2014). comparative usability study of two-factor authentication. In Proceedings of the workshop on usable security (USEC).
Grosse, E., & Upadhyay, M. (2013). Authentication at scale. IEEE Security and Privacy, 11(1), 15–22. doi:10.1109/MSP.2012.162.
Khandelwal, N. S, & Kamboj, P. (2015).Two factor authentication using Visual Cryptography and Digital Envelope in Kerberos. In 2015 International conference on electrical, electronics, signals, communication and optimization (EESCO) (pp. 1–6).
Chen, C.-T., & Lee, C.-C. (2015). A two-factor authentication scheme with anonymity for multi-server environments. Security and Communication Networks, 8(8), 1608–1625.
Zhang, L., Tang, S., Chen, J., & Zhu, S. (2015). Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography. Wireless Personal Communications, 81(1), 53–75.
Li, X., Niu*, J., Liao, J., & Liang, W. (2015). Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. International Journal of Communication Systems, 28(2), 374–382.
Jiang, Q., Ma, J., Li, G., & Li, X. (2015). Improvement of robust smart-card-based password authentication scheme. International Journal of Communication Systems, 28(2), 383–393.
Jiang, Q., Ma, J., & Tian, Y. (2015). Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol. International Journal of Communication Systems, 28(7), 1340–1351.
Kumari*, S., & Khan, M. K. (2014). Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme’. International Journal of Communication Systems, 27(12), 3939–3955.
Ma, C.-G., Wang, D., & Zhao, S.-D. (2014). Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems, 27(10), 2215–2227.
Wei, J., Xuexian, H., & Liu, W. (2015). Two-factor authentication scheme using attribute and password. International Journal of Communication Systems, 28, 18.
Wang, D., & Wang, P. (2014). Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Networks, 20, 1.
Yuan, J.-J. (2014). An enhanced two-factor user authentication in wireless sensor networks. Telecommunication Systems, 55(1), 105–113.
MohammedBalfaqi, M. I., Nordin, R., Rahem, A. A., & Balfaqih, Z. (2017). Fast handover solution for network-based distributed mobility management in intelligent transportation systems. Telecommunication Systems, 64(2), 325–346.
Zhang, L, Tang, S., & Zhu, S. (2016). Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol. Wireless Networks.
Wang, Y., Xia, Y., Hou, J., Gao, S.-M., Nie, X., & Wang, Q. (2015). A fast privacy-preserving framework for continuous location-based queries in road networks. Journal of Network and Computer Applications, 53, 57.
Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2015). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications, 80(1), 85–96.
Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.
Memon, M. H., Li, J. P., Memon, I., & Arain, Q. A. (2016). GEO matching regions: multiple regions of interests using content based image retrieval based on relative locations. Multimedia Tools and Applications, 1–35.
Memon, M. H., Khan, A., Li, J. P., Shaikh, R. A., Memon, I., & Deep, S. (2014). Content based image retrieval based on geo-location driven image tagging on the social web. In Wavelet active media technology and information processing (ICCWAMTIP), 2014 11th international computer conference on (pp. 280–283). IEEE.
Memon, I., & Arain, Q. A. (2016). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web, 1–34.
Memon, M. H., Li, J. P., Memon, I., Shaikh, R. A., & Mangi, F. A. (2015). Efficient object identification and multiple regions of interest using CBIR based on relative locations and matching regions. In Wavelet active media technology and information processing (ICCWAMTIP), 2015 12th international computer conference on (pp. 247–250). IEEE.
Arain, Q. A., Uqaili, M. A., Deng, Z., Memon, I., Jiao, J., Shaikh, M. A., et al. (2016). Clustering based energy efficient and communication protocol for multiple mix-zones over road networks. Wireless Personal Communications. doi:10.1007/s11277-016-3900-x.
Arain, Q. A., Zhongliang, D., Memon, I., Arain, S., Shaikh, F. K., Zubedi, A., et al. (2016). Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Personal Communications. doi:10.1007/s11277-016-3906-4.
Memon, I., Ali, Q., Zubedi, A., & Mangi, F. A. (2016). DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimedia Tools and Applications. doi:10.1007/s11042-016-4154-z.
Kamenyi, D. M., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864.
Gustav, Y. H, Wang, Y., Domenic, M. K, Zhang, F., & Memon, I. (2013). Velocity similarity anonymization for continuous query location based services. In Computational problem-solving (ICCP), 2013 international conference on (pp. 433–436).
Domenic, M. K, Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Preserving users’ privacy for continuous query services in road networks. In Information management, innovation management and industrial engineering conference.
Akhtar, R., Leng, S., Wu, F., & Memon, I. (2013). Improvement of content delivery in mobile social networks. In Computational problem-solving (ICCP), 2013 international conference on (pp. 139–143).
Acknowledgement
We thank reviewers for their valuable comments/suggestions on the early version of the paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Memon, I., Arain, Q.A., Memon, H. et al. Efficient User Based Authentication Protocol for Location Based Services Discovery Over Road Networks. Wireless Pers Commun 95, 3713–3732 (2017). https://doi.org/10.1007/s11277-017-4022-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4022-9