Efficient Anonymous Authentication and Group Key Distribution Scheme Based on Quantum Random Numbers for VANETs

被引:7
作者
Cheng, Teng [1 ]
Liu, Qiang [1 ]
Shi, Qin [1 ]
Yang, Ze [1 ]
Wang, Chuansu [2 ]
Zhang, Xing [2 ]
Xu, Peiling [2 ]
机构
[1] Hefei Univ Technol, Engn Res Ctr Intelligent Transportat & Cooperat Ve, Sch Automot & Transportat, Hefei 230041, Peoples R China
[2] Chery Automobile Co Ltd, Wuhu 241000, Peoples R China
关键词
Anonymous authentication; group key distribution; information security; vehicle ad hoc networks (VANETs); PRIVACY-PRESERVING AUTHENTICATION; MANAGEMENT; SECURITY; INTERNET;
D O I
10.1109/JIOT.2024.3384993
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Near-field communication in vehicle ad hoc networks can effectively reduce communication overhead compared to peer-to-peer communication. However, there is still plenty of room for improvements to be made to ensure identity authentication privacy protection and to enhance the security and efficiency of key distributions during transmissions. Therefore, this article proposes an anonymous identity authentication and group key distribution scheme based on quantum random numbers. In the proposed scheme: 1) anonymous credentials for vehicles are generated by a combination of random numbers on the vehicle side and random numbers in the trusted authority (TA), and mutual recognition of vehicles and roadside identity is achieved through the TA in the form of zero-knowledge proof, which achieves privacy protection for the vehicle during authentication and 2) a combined key generation method was devised. The roadside and the TA in this case jointly generate the group key. The TA uses a previously filled quantum key to encrypt the group session key parameter GSP(c) generated by its quantum random number generator to ensure security, and the roadside obtains the group session key parameter GSP(r) by calculating the anonymous credentials of all legitimate vehicles to achieve fast updates of the group session key. This scheme achieves forward and backward security while guaranteeing one-at-a-time encryption. The signaling and computation overheads were calculated, and the signaling overhead was reduced by nearly half. In addition, the group key issuance time was significantly reduced compared with other schemes. Through formal security analysis and experimental verification, the security and feasibility of this protocol were proved.
引用
收藏
页码:23544 / 23560
页数:17
相关论文
共 33 条
[1]   An Efficient and Provably Secure ECC-Based Conditional Privacy-Preserving Authentication for Vehicle-to-Vehicle Communication in VANETs [J].
Ali, Ikram ;
Chen, Yong ;
Ullah, Niamat ;
Kumar, Rajesh ;
He, Wen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) :1278-1291
[2]   Collaborative Learning Based Sybil Attack Detection in Vehicular AD-HOC Networks (VANETS) [J].
Azam, Sofia ;
Bibi, Maryum ;
Riaz, Rabia ;
Rizvi, Sanam Shahla ;
Kwon, Se Jin .
SENSORS, 2022, 22 (18)
[3]   Post-quantum cryptography [J].
Bernstein, Daniel J. ;
Lange, Tanja .
NATURE, 2017, 549 (7671) :188-194
[4]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[5]   Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography [J].
Chamola, Vinay ;
Jolfaei, Alireza ;
Chanana, Vaibhav ;
Parashari, Prakhar ;
Hassija, Vikas .
COMPUTER COMMUNICATIONS, 2021, 176 :99-118
[6]   Foiling covert channels and malicious classical post-processing units in quantum key distribution [J].
Curty, Marcos ;
Lo, Hoi-Kwong .
NPJ QUANTUM INFORMATION, 2019, 5 (1)
[7]   On the Efficiency of Revocation in RSA-Based Anonymous Systems [J].
Fueyo, Maria ;
Herranz, Javier .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) :1782-1790
[8]   Preserving Privacy in the Internet of Connected Vehicles [J].
Ghane, Soheila ;
Jolfaei, Alireza ;
Kulik, Lars ;
Ramamohanarao, Kotagiri ;
Puthal, Deepak .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (08) :5018-5027
[9]   A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET [J].
Goudarzi, Shidrokh ;
Soleymani, Seyed Ahmad ;
Anisi, Mohammad Hossein ;
Azgomi, Mohammad Abdollahi ;
Movahedi, Zeinab ;
Kama, Nazri ;
Rusli, Hazlifah Mohd ;
Khan, Muhammad Khurram .
AD HOC NETWORKS, 2022, 128
[10]   An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs [J].
Guo, Rui ;
Xu, Lei ;
Li, Xiong ;
Zhang, Yinghui ;
Li, Xuelei .
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 129