PAAS: PMIPv6 Access Authentication Scheme Based on Identity-Based Signature in VANETs

Due to the advantages of low handover latency and signaling costs, Proxy Mobile IPv6 (PMIPv6), as a localized mobility management protocol for next generation mobile network, can be well combined with vehicular ad-hoc networks. However, the lack of security considerations limits the rapid growth of PMIPv6. Unfortunately, few proposals are in the literature to address such issue. Motivated by this, a novel authentication scheme based on identity-based signature for PMIPv6 is proposed. Mutual authentication between mobile node and mobile access gateway is achieved for both intra-domain and inter-domain scenarios with the help of identity-based signature and service-level agreement. The authentication signaling can be finely integrated into the mobility management procedure of PMIPv6, which equips our scheme with high authentication efficiency. The formal security proof under SVO logic and the performance analysis are presented to demonstrate the robustness and efficiency of our proposed scheme.

[1]  Jeng-Farn Lee,et al.  SF-PMIPv6: A secure fast handover mechanism for Proxy Mobile IPv6 networks , 2013, J. Syst. Softw..

[2]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[3]  Xiangjie Kong,et al.  A Social-Aware Group Formation Framework for Information Diffusion in Narrowband Internet of Things , 2018, IEEE Internet of Things Journal.

[4]  Joseph H. Silverman,et al.  The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.

[5]  Fang-Yie Leu,et al.  Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks” , 2018, IEEE Systems Journal.

[6]  Karl Andersson,et al.  Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks , 2015, J. Internet Serv. Inf. Secur..

[7]  Jong-Hyouk Lee,et al.  Diffie-Hellman key based authentication in proxy mobile IPv6 , 2010 .

[8]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[9]  Paul C. van Oorschot,et al.  Extending cryptographic logics of belief to key agreement protocols , 1993, CCS '93.

[10]  MengChu Zhou,et al.  Emotion-Aware Cognitive System in Multi-Channel Cognitive Radio Ad Hoc Networks , 2018, IEEE Communications Magazine.

[11]  Feng Xia,et al.  Social-Oriented Adaptive Transmission in Opportunistic Internet of Smartphones , 2017, IEEE Transactions on Industrial Informatics.

[12]  Mark R. Tuttle,et al.  A Semantics for a Logic of Authentication , 1991, PODC 1991.

[13]  Qin Yajuan An Authentication Protocol for Proxy Mobile IPv6 , 2008 .

[14]  Cui Guo-Hua Secure Access Authentication Scheme in Mobile IPv6 Networks , 2009 .

[15]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[16]  Feng Xia,et al.  CAIS: A Copy Adjustable Incentive Scheme in Community-Based Socially Aware Networking , 2017, IEEE Transactions on Vehicular Technology.

[17]  Feng Xia,et al.  Vehicular Social Networks: A survey , 2018, Pervasive Mob. Comput..

[18]  MengChu Zhou,et al.  A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.

[19]  Frank Xia,et al.  Fast Handovers for Proxy Mobile IPv6 , 2010, RFC.

[20]  Anna Maria Vegni,et al.  A Survey on Vehicular Social Networks , 2015, IEEE Communications Surveys & Tutorials.

[21]  Xuemin Shen,et al.  An Efficient Hybrid HIP-PMIPv6 Scheme for Seamless Internet Access in Urban Vehicular Scenarios , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[22]  Carol J. Fung,et al.  A Survey of Android Security Threats and Defenses , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[23]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[24]  Yi Mu,et al.  Identity-Based Proxy Signature from Pairings , 2007, ATC.

[25]  Meng Chang Chen,et al.  SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks , 2013, IEEE Systems Journal.

[26]  Pin-Han Ho,et al.  An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[27]  Lei Guo,et al.  Green Survivable Collaborative Edge Computing in Smart Cities , 2018, IEEE Transactions on Industrial Informatics.

[28]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[29]  Jean-Marie Bonnin,et al.  HOTA: Handover optimized ticket-based authentication in network-based mobility management , 2013, Inf. Sci..

[30]  Xavier Boyen,et al.  Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems , 2007, RFC.

[31]  Rajeev Koodli Mobile IPv6 Fast Handovers , 2009, RFC.

[32]  Paul F. Syverson,et al.  On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[33]  Claude Castelluccia,et al.  Hierarchical Mobile IPv6 (HMIPv6) Mobility Management , 2008, RFC.