• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
ZHANG Wenfang, SUN Haifeng, WANG Yu, LIN Wei, WANG Xiaomin. Security and Efficiency Enhanced Authentication Scheme Based on Self-Updated Hash Chain for Train-Ground Communication[J]. Journal of Southwest Jiaotong University, 2020, 55(6): 1171-1180, 1206. doi: 10.3969/j.issn.0258-2724.20190205
Citation: ZHANG Wenfang, SUN Haifeng, WANG Yu, LIN Wei, WANG Xiaomin. Security and Efficiency Enhanced Authentication Scheme Based on Self-Updated Hash Chain for Train-Ground Communication[J]. Journal of Southwest Jiaotong University, 2020, 55(6): 1171-1180, 1206. doi: 10.3969/j.issn.0258-2724.20190205

Security and Efficiency Enhanced Authentication Scheme Based on Self-Updated Hash Chain for Train-Ground Communication

doi: 10.3969/j.issn.0258-2724.20190205
  • Received Date: 13 Mar 2019
  • Rev Recd Date: 31 Aug 2019
  • Available Online: 16 Oct 2019
  • Publish Date: 15 Dec 2020
  • Aiming at the special requirement of security and real-time performance in next generation high-speed railway wireless communication system, long term evolution-railway (LTE-R), a security and efficiency enhanced train-ground authentication scheme based on self-updated hash chain is proposed. In the scheme, the master key of home subscriber sever (HSS) is used for encrypting the anonymous variable temporary identity (TID) of the on-board unity (OBU) so as to protect the privacy of OBU and resist the desynchronization attack. In order to realize efficient mutual authentication between the train and the service network, hash chains are used to replace the authentication vectors, and the local updating of hash chains can avoid restarting the full-authentication protocol caused by exhaustion of authentication vectors. Moreover, by using the identity ticket issued by the mobility management entity (MME), seamless handover-authentication can be realized in coordination with base stations. Security and performance analysis shows that compared with the long term evolution (LTE) standard protocols under the same condition, the computation cost of the proposed full-authentication protocol, re-authentication protocol and handover-authentication protocol is reduced by 41.67%, 44.44%, and 45.45% respectively, and the traffic is reduced by 62.11%, 50.91%, and 84.91% respectively, which can meet the security and real-time requirements of LTE-R network.

     

  • The 3rd Generation Partnership Project. 3GPP system architecture evolution (SAE); security architecture: 3GPP TS 33.401 V12.5.0[S]. Valbonne: 3GPP Organizational Partners, 2012.
    CAO J, MA M, LI H. A survey on security aspects for LTE & LTE-A networks[J]. IEEE Communications Surveys and Tutorials, 2014, 16(1): 283-302. doi: 10.1109/SURV.2013.041513.00174
    ABDRABOU M A, ELBAYOUMY A D E, El-WANIS E A. LTE authentication protocol (EPS-AKA) weaknesses solution[C]//2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems. Cairo: IEEE, 2015: 434-441.
    ABDELJEBBAR M, ELKOUCH R. Security analysis of LTE/SAE networks over E-UTRAN[C]//2016 International Conference on Information Technology for Organizations Development (IT4OD). Fez: IEEE, 2016: 1-5.
    ALEZABI K A, HASHIM F, HASHIM S J, et al. An efficient authentication and key agreement protocol for 4G (LTE) networks[C]//IEEE REGION 10 SYMPOSIUM. Kuala Lumpur: IEEE, 2014: 502-507.
    KIM S, CHOI J Y, JEONG J. On authentication signaling costs in hierarchical LTE networks[C]//IEEE 7th International Conference on Ubi-Media Computing and Workshops. Ulaanbaatar: IEEE, 2014: 11-16.
    LI Jinguo, WEN Mi, ZHANG Tao. Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks[J]. IEEE Internet of Things Journal, 2016, 3(3): 408-417. doi: 10.1109/JIOT.2015.2495321
    HUAN C K. Security analysis and enhancements in LTE-advanced networks[D]. Seoul: Sungkyunkwan University, 2011.
    HAMANDI K, SARJI I, CHEHAB A, et al. Privacy enhanced and computationally efficient HSK-AKA LTE scheme[C]//IEEE 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA). Barcelona: IEEE, 2013: 929-934.
    DEGEFA F B, LEE D, KIM J, et al. Performance and security enhanced authentication and key agreement protocol for SAE/LTE network[J]. Computer Networks, 2016, 94(15): 145-163.
    LI Xiehua, WANG Yongjun. Security enhanced authentication and key agreement protocol for LTE/SAE network[C]//2011 7th International Conference on Wireless Communications, Networking and Mobile Computing. Wuhan: IEEE, 2011: 1-4.
    DENG Yaping, FU Hong, XIE Xianzhong, et al. A novel 3GPP SAE authentication and key agreement protocol[C]//IEEE International Conference on Network Infrastructure & Digital Content. Beijing: IEEE, 2009: 557-561.
    FANG Jiexiang, JIANG Rui. An analysis and improvement of 3GPP SAE AKA protocol based on strand space model[C]//2010 International Conference on Network Infrastructure and Digital Content (IC-NIDC). Beijing: IEEE, 2010: 789-793.
    QIU Y, MA M, WANG X. A proxy signature-based handover authentication scheme for LTE wireless networks[J]. Journal of Network and Computer Applications, 2017, 83(4): 63-71.
    PRASAD M, MANOHARAN R. A robust secure DS-AKA with mutual authentication for LTE-A[J]. Applied Mathematical Sciences, 2015, 9(4): 2337-2349.
    姚洪磊,张彦,周泽岩. 基于PKI/CA技术的铁路身份认证体系[J]. 中南大学学报(自然科学版),2013,44(1): 356-361.

    YAO Honglei, ZHANG Yan, ZHOU Zeyan. Planning and constructing of PKI/CA certification system of railway industry[J]. Journal of Central South University (Science and Technology), 2013, 44(1): 356-361.
    GAO Tingting, SUN Bin. A high-speed railway mobile communication system based on LTE[C]//International Conference on Electronics & Information Engineering. Kyoto: IEEE, 2010: 414-417.
    HE Ruisi, AI Bo. High-speed railway communications:from GSM-R to LTE-R[J]. IEEE Vehicular Technology Magazine, 2016, 11(3): 49-58. doi: 10.1109/MVT.2016.2564446
    LAMPORT L. Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24(24): 770-772.
    白媛,王倩,贾其兰,等. 一种高效安全的EPS AKA协议[J]. 北京邮电大学学报,2015,38(1): 10-14.

    BAI Yuan, WANG Qian, JIA Qilan, et al. An efficient and secured AKA for EPS networks[J]. Journal of Beijing University of Posts and Telecommunications, 2015, 38(1): 10-14.
    CAO Jin, LI Hui, MA M, et al. A simple and robust handover authentication between HeNB and eNB in LTE networks[J]. Computer Networks, 2012, 56(8): 2119-2131. doi: 10.1016/j.comnet.2012.02.012
  • Relative Articles

    [1]WANG Xu, WANG Mingnian, YAN Tao, YU Li. Influence of Base Emission Factor Update on Tunnel Fresh-Air Demand[J]. Journal of Southwest Jiaotong University, 2024, 59(1): 113-120. doi: 10.3969/j.issn.0258-2724.20210585
    [2]ZHANG Liyan, LUO Bo, ZHENG Xing, LIU Yuxiao, WANG Jie. Protection Scheme of New Continuous Cable Power Supply System[J]. Journal of Southwest Jiaotong University, 2023, 58(5): 1135-1144. doi: 10.3969/j.issn.0258-2724.20220510
    [3]ZHANG Liping, YANG Yu, JIN Feihu, LI Song, HAO Zhongxiao. A Skyline Query Method Based on Differential Privacy Protection[J]. Journal of Southwest Jiaotong University, 2022, 57(5): 982-989. doi: 10.3969/j.issn.0258-2724.20200714
    [4]LI Zechen, LI Hengchao, HU Wenshuai, YANG Jinyu, HUA Zexi. Masked Face Detection Model Based on Multi-scale Attention-Driven Faster R-CNN[J]. Journal of Southwest Jiaotong University, 2021, 56(5): 1002-1010. doi: 10.3969/j.issn.0258-2724.20210017
    [5]JIANG Zhengrong, LIU Xiaowei, SHI Kairong, LIN Quanpan. Method of Force-Finding Analysis Based on Ratio Updating for Cable Domes[J]. Journal of Southwest Jiaotong University, 2020, 55(1): 150-157. doi: 10.3969/j.issn.0258-2724.20180201
    [6]XIONG Ling, PENG Daiyuan, PENG Tu, LIANG Hongbin. Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services[J]. Journal of Southwest Jiaotong University, 2019, 54(1): 202-210. doi: 10.3969/j.issn.0258-2724.20170596
    [7]MA Lianchuan, ZHANG Yuzhuo, SUN Yaqing, MU Jiancheng, CAO Yuan. Reliability and Delay of DSPN-Based Ground Communication System in High-Speed Maglev Vehicles[J]. Journal of Southwest Jiaotong University, 2014, 27(6): 1016-1023. doi: 10.3969/j.issn.0258-2724.2014.06.013
    [8]LIU Li, WANG Yongqing. Security Analysis of Video Hashing[J]. Journal of Southwest Jiaotong University, 2012, 25(4): 675-679. doi: 10.3969/j.issn.0258-2724.2012.04.022
    [9]LI Ye, YAN Yusong. Model of Train Residence Time within GSM-R Cell in Section of Passenger Dedicated Line[J]. Journal of Southwest Jiaotong University, 2010, 23(6): 965-972. doi: 10.3969/j.issn.0258-2724.2010.06.024
    [10]LIU Xiufeng, ZHANG Aili. Weightable and Regular Independent System[J]. Journal of Southwest Jiaotong University, 2007, 20(3): 384-388.
    [11]LIU Zhenfeng, FENG Quanyuan. Thermal Shutdown Circuit with Low Voltage and Low Power Consumption for Power Management IC[J]. Journal of Southwest Jiaotong University, 2006, 19(3): 310-313.
    [12]ZHENG Yu, HE Da-ke, MEI Qi-xiang. Trusted Computing-Based Security Model for Software Protection[J]. Journal of Southwest Jiaotong University, 2006, 19(1): 63-67,96.
    [13]LIU Zhao-hui, LI Li. Control of Chaotic Motion of a Planar 2R Robot[J]. Journal of Southwest Jiaotong University, 2006, 19(1): 11-14.
    [14]RONG Jian, HU Yu. Key Technology and Schemes of Optical Communication between GEO and LEO[J]. Journal of Southwest Jiaotong University, 2003, 16(2): 220-223.
  • Cited by

    Periodical cited type(2)

    1. 陈永,常婷,张冰旺. 混沌映射与中国剩余定理增强的切换认证方案. 西安电子科技大学学报. 2024(04): 192-205 .
    2. 陈永,刘雯,詹芝贤. 基于混合密钥增强的LTE-R车地认证密钥协商方案. 铁道学报. 2023(06): 69-79 .

    Other cited types(5)

  • Created with Highcharts 5.0.7Amount of accessChart context menuAbstract Views, HTML Views, PDF Downloads StatisticsAbstract ViewsHTML ViewsPDF Downloads2024-052024-062024-072024-082024-092024-102024-112024-122025-012025-022025-032025-0402.557.51012.515
    Created with Highcharts 5.0.7Chart context menuAccess Class DistributionFULLTEXT: 37.9 %FULLTEXT: 37.9 %META: 58.8 %META: 58.8 %PDF: 3.2 %PDF: 3.2 %FULLTEXTMETAPDF
    Created with Highcharts 5.0.7Chart context menuAccess Area Distribution其他: 7.7 %其他: 7.7 %其他: 0.3 %其他: 0.3 %上海: 0.3 %上海: 0.3 %临汾: 0.6 %临汾: 0.6 %北京: 6.4 %北京: 6.4 %南京: 0.3 %南京: 0.3 %哥伦布: 0.6 %哥伦布: 0.6 %大连: 1.9 %大连: 1.9 %太原: 0.6 %太原: 0.6 %宣城: 1.0 %宣城: 1.0 %张家口: 3.5 %张家口: 3.5 %悉尼: 0.6 %悉尼: 0.6 %成都: 3.5 %成都: 3.5 %扬州: 0.3 %扬州: 0.3 %杭州: 1.3 %杭州: 1.3 %漯河: 0.3 %漯河: 0.3 %石家庄: 0.6 %石家庄: 0.6 %芒廷维尤: 16.0 %芒廷维尤: 16.0 %芝加哥: 0.6 %芝加哥: 0.6 %西宁: 48.2 %西宁: 48.2 %诺沃克: 1.3 %诺沃克: 1.3 %贵阳: 0.3 %贵阳: 0.3 %运城: 1.6 %运城: 1.6 %长沙: 1.9 %长沙: 1.9 %其他其他上海临汾北京南京哥伦布大连太原宣城张家口悉尼成都扬州杭州漯河石家庄芒廷维尤芝加哥西宁诺沃克贵阳运城长沙

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(8)  / Tables(3)

    Article views(610) PDF downloads(13) Cited by(7)
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return