A dynamic C-V2X anonymous authentication and group key agreement protocol

被引:2
作者
Cui, Beibei [1 ]
He, Wei [2 ]
Cui, Yan [3 ,4 ]
机构
[1] Huishang Vocat Coll, Dept Elect Informat, Hefei 230039, Peoples R China
[2] Anhui Water Conservancy Tech Coll, Sch Mech & Automot Engn, Hefei 231603, Peoples R China
[3] Anhui Univ Sci & Technol, Sch Math & Big Data, Huainan 232001, Peoples R China
[4] Bozhou Vocat & Tech Coll, Basic Dept, Bozhou 236000, Peoples R China
关键词
V2X-GKA; Open channel; Session key; ECDLP; DBDH; LIGHTWEIGHT AUTHENTICATION; SCHEME; SECURE;
D O I
10.1007/s10207-024-00876-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, in addressing security challenges within 5 G-era Vehicular Ad-Hoc Networks (VANET), a new protocol has been designed in this paper, named V2X-GKA (Dynamic Group Authentication and Key Agreement Protocol based on C-V2X). V2X-GKA utilizes cryptographic techniques such as ECDLP and DBDH to effectively mitigate risks associated with certificate forgery and key theft. Through the integration of authentication and group key agreement mechanisms, the protocol facilitates dynamic member management and secure key updates without necessitating complete protocol re-execution. This approach not only ensures both forward and backward security but also optimizes algorithmic processes, rendering it highly suitable for real-time, high-speed mobile environments. Through necessary security analysis, it is confirmed that the V2X-GKA scheme in this paper meets the existing security objectives. Compared with other similar schemes, it exhibits a certain degree of completeness and superiority, particularly in open-channel scenarios.
引用
收藏
页码:2977 / 2989
页数:13
相关论文
共 31 条
[1]  
Abdalla M., 2006, LECT NOTES COMPUT SC, V4004, P1
[2]   Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications [J].
AbdolrezaEftekhari, Seyed ;
Nikooghadam, Morteza ;
Rafighi, Masoud .
VEHICULAR COMMUNICATIONS, 2021, 28
[3]   Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for Internet of Things environment [J].
Ali, Usman ;
Bin Idris, Mohd Yamani Idna ;
Frnda, Jaroslav ;
Bin Ayub, Mohamad Nizam ;
Khan, Muhammad Asghar ;
Khan, Nauman ;
Beegum, T. Rehannara ;
Jasim, Ahmed A. ;
Ullah, Insaf ;
Babar, Mohammad .
INTERNET OF THINGS, 2023, 24
[4]  
Almasan P., 2023, ARXIV
[5]  
[Anonymous], 2019, 16092B2019 IEEE
[6]  
[Anonymous], 1979, SHARE SECRET
[7]   Blockchain-based batch authentication protocol for Internet of Vehicles [J].
Bagga, Palak ;
Sutrala, Anil Kumar ;
Das, Ashok Kumar ;
Vijayakumar, Pandi .
JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 113
[8]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[9]  
Bresson E., 2001, Proceedings of the 8th ACM Conference on Computer and Communication Gold Coast, Dec. 9-13, Berlin Heidelberg, P290, DOI DOI 10.1007/3-540-45682-118
[10]  
Büttner C, 2015, 2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), P259