A Train-ground Security Authentication Scheme Based on Anonymous Proxy Signature for LTE-R System

被引:0
|
作者
Wang Y. [1 ]
Zhang W. [1 ]
Wang X. [1 ,2 ]
Lin W. [2 ]
Gao S. [2 ]
Wu W. [1 ]
机构
[1] School of Information Science and Technology, Southwest Jiaotong University, Chengdu
[2] The Center of National Railway Intelligent Transportation System Engineering and Technology, China Academy of Railway Science Corparation Limited, Beijing
来源
Tiedao Xuebao/Journal of the China Railway Society | 2020年 / 42卷 / 03期
关键词
Anonymous proxy signature; Authentication; EPS-AKA; LTE-R; Protection of IMSI;
D O I
10.3969/j.issn.1001-8360.2020.03.010
中图分类号
学科分类号
摘要
In the view of the security loopholes and authentication efficiency of train-ground wireless communication entity authentication in the next generation railway mobile communication system LTE-R, a security authentication scheme for vehicle-ground wireless communication based on anonymous proxy signature algorithm was proposed in this paper. This proposal introduced registration authentication, initialization authentication and re-authentication for a series of scenarios. This scheme can provide IMSI protection, mobile management entity pre-authentication, undeniable feature, and DoS resistant ability with the benefit of anonymous proxy signature. Along with that, the authentication information was generated locally to reduce the computational and communicational cost of re-authentication. The results of the analysis on the security and performance show that this scheme ensures the security of railway communications and the timeliness of authentication during the rapid movement process of trains. © 2020, Department of Journal of the China Railway Society. All right reserved.
引用
收藏
页码:76 / 84
页数:8
相关论文
共 20 条
  • [1] Fang X., Cui Y., Yan L., Et al., The Evolution and Development of Key Technologies of Mobile Communication Systems for High-speed Railway, Journal of Electronics & Information Technology, 37, 1, pp. 226-235, (2015)
  • [2] 3GPP TS 33.4013GPP System Architecture Evolution (SAE): Security Architecture (Release 12), (2012)
  • [3] Alquhayz H., Albayatti A., Platt A., Security Management System for 4G Heterogeneous Networks, Proceedings of Conference on World Congress on Engineering, (2015)
  • [4] Tang C., Naumann D.A., Wetzel S., Analysis of Authentication and Key Establishment in Inter Generational Mobile Telephony, Proceedings of 2013 IEEE 10th International Conference on Embedded and Ubiquitous Computing High Performance Computing and Communications, pp. 1605-1614, (2013)
  • [5] Ahmed T., Barankanira D., Antoine S., Et al., Inter-system Mobility in Evolved Packet System (EPS): Connecting non-3GPP Accesses, Proceedings of International Conference on Intelligence in Next Generation Networks, pp. 1-6, (2010)
  • [6] Yu D., Wen W., Non-access-stratum Request Attack in E-UTRAN, Proceedings of IEEE Conference on Computing, Communications and Applications, pp. 48-53, (2012)
  • [7] Cao J., Ma M., Li H., Et al., A Survey on Security Aspects for LTE and LTE-A Networks, IEEE Communications on Surveys & Tutorials, 16, 1, pp. 283-302, (2014)
  • [8] Li X., Wang Y., Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network, Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, (2011)
  • [9] Lai C., Li H., Lu R., Et al., SE-AKA: A Secure and Efficient Group Authentication and Key Agreement Protocol for LTE Networks, Computer Networks, 57, 17, pp. 3492-3510, (2013)
  • [10] Ekene O.E., Ruhl R., Zavarsky P., Enhanced User Security and Privacy Protection in 4G LTE Network, Proceedings of IEEE Computer Software and Applications Conference, pp. 443-448, (2016)