Efficient Anonymous Authentication and Group Key Distribution Scheme Based on Quantum Random Numbers for VANETs
被引:7
作者:
Cheng, Teng
论文数: 0引用数: 0
h-index: 0
机构:
Hefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R ChinaHefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R China
Cheng, Teng
[1
]
Liu, Qiang
论文数: 0引用数: 0
h-index: 0
机构:
Hefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R ChinaHefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R China
Liu, Qiang
[1
]
Shi, Qin
论文数: 0引用数: 0
h-index: 0
机构:
Hefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R ChinaHefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R China
Shi, Qin
[1
]
Yang, Ze
论文数: 0引用数: 0
h-index: 0
机构:
Hefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R ChinaHefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R China
Yang, Ze
[1
]
Wang, Chuansu
论文数: 0引用数: 0
h-index: 0
机构:
Chery Automobile Co Ltd, Wuhu 241000, Peoples R ChinaHefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R China
Wang, Chuansu
[2
]
Zhang, Xing
论文数: 0引用数: 0
h-index: 0
机构:
Chery Automobile Co Ltd, Wuhu 241000, Peoples R ChinaHefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R China
Zhang, Xing
[2
]
Xu, Peiling
论文数: 0引用数: 0
h-index: 0
机构:
Chery Automobile Co Ltd, Wuhu 241000, Peoples R ChinaHefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R China
Xu, Peiling
[2
]
机构:
[1] Hefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R China
[2] Chery Automobile Co Ltd, Wuhu 241000, Peoples R China
Anonymous authentication;
group key distribution;
information security;
vehicle ad hoc networks (VANETs);
PRIVACY-PRESERVING AUTHENTICATION;
MANAGEMENT;
SECURITY;
INTERNET;
D O I:
10.1109/JIOT.2024.3384993
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
Near-field communication in vehicle ad hoc networks can effectively reduce communication overhead compared to peer-to-peer communication. However, there is still plenty of room for improvements to be made to ensure identity authentication privacy protection and to enhance the security and efficiency of key distributions during transmissions. Therefore, this article proposes an anonymous identity authentication and group key distribution scheme based on quantum random numbers. In the proposed scheme: 1) anonymous credentials for vehicles are generated by a combination of random numbers on the vehicle side and random numbers in the trusted authority (TA), and mutual recognition of vehicles and roadside identity is achieved through the TA in the form of zero-knowledge proof, which achieves privacy protection for the vehicle during authentication and 2) a combined key generation method was devised. The roadside and the TA in this case jointly generate the group key. The TA uses a previously filled quantum key to encrypt the group session key parameter GSP(c) generated by its quantum random number generator to ensure security, and the roadside obtains the group session key parameter GSP(r) by calculating the anonymous credentials of all legitimate vehicles to achieve fast updates of the group session key. This scheme achieves forward and backward security while guaranteeing one-at-a-time encryption. The signaling and computation overheads were calculated, and the signaling overhead was reduced by nearly half. In addition, the group key issuance time was significantly reduced compared with other schemes. Through formal security analysis and experimental verification, the security and feasibility of this protocol were proved.