Privacy-Preserving Quick Authentication in Fast Roaming Networks

Vehicular networks will become an important component for information accesses in one's daily life. A vehicular network provides a vehicular user not only chances to communicate with peer vehicles but also to use Internet through roadside access points (APs). During a trip a vehicular user could roam across multiple APs either belong to their home wireless domain or to domains owned by different authorities. This poses challenges on privacy and network performance to the current public wireless network access protocols. In this paper we explore an idea that shifts the paradigm of authentication that goes back to home networks to a paradigm of authentication that performs at the APs. We propose three authentication schemes in realizing the idea. These schemes are designed for preserving user's identity and location privacy. They also greatly reduce response time for authentication when roaming. The paper then analyzes the security and privacy properties of these schemes as well as the efficiency of them

[1]  Yvon Gourhant,et al.  AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture , 2005, VANET '05.

[2]  Qi He,et al.  The quest for personal control over mobile location privacy , 2004, IEEE Communications Magazine.

[3]  R. Poovendran,et al.  CARAVAN: Providing Location Privacy for VANET , 2005 .

[4]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[5]  Farooq Bari,et al.  An AAA based service customization framework for public WLANs , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[6]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  Marco Gruteser,et al.  Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.

[9]  George C. Polyzos,et al.  A peer-to-peer approach to wireless LAN roaming , 2003, WMASH '03.

[10]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[11]  Markus Jakobsson,et al.  On Quorum Controlled Asymmetric Proxy Re-encryption , 1999, Public Key Cryptography.

[12]  N. Asokan,et al.  Untraceability in mobile networks , 1995, MobiCom '95.

[13]  Jörg Ott,et al.  Drive-thru Internet: IEEE 802.11b for "automobile" users , 2004, IEEE INFOCOM 2004.

[14]  Nalini Venkatasubramanian,et al.  Security Issues in a Future Vehicular Network , 2002 .

[15]  Steven D. Galbraith,et al.  Implementing the Tate Pairing , 2002, ANTS.

[16]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[17]  Fred B. Schneider,et al.  Distributed Blinding for Distributed ElGamal Re-Encryption , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[18]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[19]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[20]  Helen J. Wang,et al.  A Framework for Location Privacy in Wireless Networks , 2005 .

[21]  Wei Liang,et al.  On performance analysis of challenge/response based authentication in wireless networks , 2005, Comput. Networks.

[22]  Wei-Kuan Shih,et al.  Running cellular/PWLAN services: practical considerations for cellular/PWLAN architecture supporting interoperator roaming , 2006, IEEE Commun. Mag..

[23]  Pierangela Samarati,et al.  Location privacy in pervasive computing , 2008 .

[24]  Ian F. Akyildiz,et al.  A new signaling protocol for intersystem roaming in next-generation wireless systems , 2001, IEEE J. Sel. Areas Commun..

[25]  Marco Gruteser,et al.  USENIX Association , 1992 .

[26]  Kaoru Sezaki,et al.  Enhancing wireless location privacy using silent period , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[27]  Paulo S. L. M. Barreto,et al.  Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.

[28]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.