Cross-domain authentication and the key agreement protocol in VANETs

被引:0
|
作者
Li X. [1 ]
Yang D. [1 ]
Zheng X. [1 ]
Zhu X. [1 ]
Chen B. [1 ]
Zhang Y. [2 ]
机构
[1] School of Mathematics and Computer, Dali University, Dali
[2] National Computer Network Intrusion Prevention Center, Chinese Academy of Sciences University, Beijing
来源
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University | 2021年 / 48卷 / 01期
关键词
Authentication and key agreement; Cross-domain; Password; VANETs; Without server participation;
D O I
10.19665/j.issn1001-2400.2021.01.016
中图分类号
学科分类号
摘要
Aiming at the problem that vehicle-to-vehicle (V-2-V) authentication and key agreement of cross-domain in VANETs (vehicular ad hoc networks) can be accomplished by the participation of servers,a cross-domain V-2-V password-based authentication and key agreement protocol without server participation is proposed.The protocol uses the method of distributing authentication credentials to achieve cross-authentication,and enhances the security of passwords by combining smart cards with passwords.The security of the protocol is proved under the hard problem of ECCDH (Elliptic Curve Computational Diffie-Hellman).Compared with the existing cross-domain authentication and key agreement protocol that requires server participation,the proposed protocol does not involve server participation,thus avoiding the communication delay caused by the server's inability to process a large number of authentication requests. © 2021, The Editorial Board of Journal of Xidian University. All right reserved.
引用
收藏
页码:141 / 148
页数:7
相关论文
共 15 条
  • [1] ZEADALLY S, HUNT R, CHEN Y S, Et al., Vehicular Ad Hoc Networks (VANETs):Status,Results,and Challenges[J], Telecommunication Systems, 50, 4, pp. 217-241, (2012)
  • [2] ZHANG L, WU Q, SOLANAS A, Et al., A Scalable Robust Authentication Protocol for Secure Vehicular Communications, IEEE Transactions on Vehicular Technology, 59, 4, pp. 1606-1617, (2010)
  • [3] HE D, ZEADALLY S, XU B, Et al., An Efficient Identity-based Conditional Privacy-preserving Authentication Scheme for Vehicular Ad Hoc Networks[J], IEEE Transactions on Information Forensics and Security, 10, 12, pp. 2681-2691, (2015)
  • [4] YING B, NAYAK A., Anonymous and Lightweight Authentication for Secure Vehicular Networks, IEEE Transactions on Vehicular Technology, 66, 12, pp. 10626-10636, (2017)
  • [5] WANG F, XU Y, ZHANG H, Et al., 2FLIP:a Two-factor Lightweight Privacy-preserving Authentication Scheme for VANET[J], IEEE Transactions on Vehicular Technology, 65, 2, pp. 896-911, (2016)
  • [6] YING B, NAYAK A., Anonymous and Lightweight Authentication for Secure Vehicular Networks, IEEE Transactions on Vehicular Technology, 66, 12, pp. 10626-10636, (2017)
  • [7] TAN H, XUAN S, CHUNGI, HCDA:Efficient Pairing-free Homographic Key Management for Dynamic Cross-domain Authentication in VANETs[J], Symmetry, 12, 6, pp. 1-27, (2020)
  • [8] CHEN L, LIM H W, YANG G., Cross-domain Password-based Authenticated Key Exchange Revisited[C], Proceedings of the 2013 IEEE INFOCOM, pp. 1052-1060, (2013)
  • [9] SHENM, LIU H, ZHU L, Et al., Blockchain-assisted Secure Device Authentication for Cross-domain Industrial IoT[J], IEEE Journal on Selected Areas in Communications, 38, 5, pp. 942-954, (2020)
  • [10] JIA X, HU N, SU S, Et al., IRBA:an Identity-based Cross-domain Authentication Scheme for the Internet of Things[J], Electronics, 9, 4, (2020)