Improving the Security of Wireless Communications on High-Speed Trains by Efficient Authentication in SCN-R

被引:9
作者
Xu, Tong [1 ]
Gao, Deyun [1 ]
Dong, Ping [1 ]
Foh, Chuan Heng [2 ]
Zhang, Hongke [1 ]
Leung, Victor C. M. [3 ]
机构
[1] Beijing Jiaotong Univ, Natl Engn Lab Next Generat Internet Interconnect, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
[2] Univ Surrey, Inst Commun Syst, Dept Elect & Elect Engn, 5GIC, Guildford GU1 2UX, Surrey, England
[3] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
关键词
Wireless communication; communication system security; chaos; random number generator; cyber attack; RANDOM NUMBER GENERATORS; TRANSMISSION; SCHEME;
D O I
10.1109/TVT.2019.2920988
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, we have witnessed the remarkable development in high-speed railways around the world. To provide a robust and fast wireless network for the onboard passengers, we have earlier proposed smart collaborative networking for railways (SCN-R). In the realization of SCN-R, its security is challenged by potential exploitation of authentication vulnerabilities since traditional authentication mechanisms are unsuitable for scenarios with fast moving objects due to their complex and relatively timely operations. In this paper, we address this issue by proposing a new efficient authentication mechanism, which is based on a new design of chaotic random number generator (RNG). Comparing with the recent proposal relying on the precise boundaries of chaotic map state spaces, our RNG uses two logistic maps to avoid the time-consuming boundary location process. The proposed authentication mechanism uses the RNG to generate and validate the one-time password (OTP). To support different authentication applications, different lengths of OTPs can be used to differentiate and identify the applications. We have implemented our proposed authentication mechanism under real-world conditions, with results showing the feasibility and effectiveness of our authentication mechanism.
引用
收藏
页码:7283 / 7295
页数:13
相关论文
共 35 条
  • [1] [Anonymous], INT J BIFURCATION CH
  • [2] [Anonymous], 2005, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, DOI DOI 10.1145/1102219.1102223
  • [3] [Anonymous], OPT QUANTUM ELECT
  • [4] [Anonymous], 2004, CONTRIBUTION HDB INF
  • [5] Asl FR, 2017, VEH TECHNOL CONFE
  • [6] EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
    Azees, Maria
    Vijayakumar, Pandi
    Deboarh, Lazarus Jegatha
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) : 2467 - 2476
  • [7] Chankasame W, 2015, 2015 SCIENCE AND INFORMATION CONFERENCE (SAI), P1357, DOI 10.1109/SAI.2015.7237319
  • [8] Chung H, 2012, FUTURE OF THE WELFARE STATE: SOCIAL POLICY ATTITUDES AND SOCIAL CAPITAL IN EUROPE, P46
  • [9] Performance Analysis of Massive Spatial Modulation MIMO in High-Speed Railway
    Cui, Yaping
    Fang, Xuming
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (11) : 8925 - 8932
  • [10] Improving Onboard Internet Services for High-Speed Vehicles by Multipath Transmission in Heterogeneous Wireless Networks
    Dong, Ping
    Song, Bin
    Zhang, Hongke
    Du, Xiaojiang
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (12) : 9493 - 9507