Security Key Management Protocol for Cross-domain Authentication of Internet of Vehicles

被引:0
作者
Cui, Meili [1 ]
Ning, Zhenhu [1 ]
Gao, Junchen [1 ]
Peng, Jin [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing, Peoples R China
来源
2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024 | 2024年
关键词
Internet of Vehicles; certification protocol; credibility assessment; PRIVACY-PRESERVING AUTHENTICATION; AGREEMENT SCHEME;
D O I
10.1109/ICICSE61805.2024.10625679
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Vehicles is a multi-trust domain autonomous network designed to provide real-time and reliable message services for vehicles, including road conditions, path planning, etc. However, due to factors such as the rapid movement of vehicle nodes, frequent network access, and uneven distribution of vehicle nodes, rapid cross-domain message authentication has become an important challenge. In order to enhance the security of cross-domain authentication in the Internet of Vehicles, this paper proposes a secure authentication key management protocol. In this protocol, the current domain's edge server comprehensively evaluates the vehicle by combining the real-time information of the vehicle and the information of the domains it has passed before. Once the assessment is qualified, the vehicle, with the assistance of TA, completes the establishment of session keys to achieve secure communication. This article uses BAN logic to formally prove the security of the protocol and analyzes its performance through network simulation tools. Experimental results demonstrate that the proposed scheme significantly improves security and performs well in terms of network performance.
引用
收藏
页码:126 / 130
页数:5
相关论文
共 50 条
[31]   PMAKA-IoV: A Physical Unclonable Function (PUF)-Based Multi-Factor Authentication and Key Agreement Protocol for Internet of Vehicles [J].
Yuan, Ming ;
Xiao, Yuelei .
INFORMATION, 2025, 16 (05)
[32]   An Asynchronous Group Key Exchange Protocol with Threshold Join Function for Internet of Vehicles [J].
Wang, Xiangyang ;
Luo, Wei ;
Yang, Xingcheng ;
Chen, Biwen .
FRONTIERS IN CYBER SECURITY, FCS 2024, PT II, 2024, 2316 :166-179
[33]   Blockchain-based fast handover authentication protocol for Internet of Vehicles in small industrial parks [J].
Tian, Junfeng ;
Shen, Yue ;
Wang, Yiting .
VEHICULAR COMMUNICATIONS, 2024, 50
[34]   Enhanced authentication and key management scheme for securing data transmission in the internet of things [J].
Harbi, Yasmine ;
Aliouat, Zibouda ;
Refoufi, Allaoua ;
Harousb, Saad ;
Bentaleb, Abdelhak .
AD HOC NETWORKS, 2019, 94
[35]   Cross-Chain Protocol Lightning-C for Internet of Vehicles Environment [J].
Lu, Lili ;
Gu, Weiheng ;
Xu, Xi ;
Wang, Musen ;
Liu, Shangdong ;
Wu, Fei .
IEEE ACCESS, 2024, 12 :111932-111941
[36]   EAIA: An Efficient and Anonymous Identity Authentication Protocol for V2V Communications in Internet of Vehicles [J].
Du, Qianmin ;
Zhou, Jianhong ;
Ma, Maode .
2024 IEEE 5TH ANNUAL WORLD AI IOT CONGRESS, AIIOT 2024, 2024, :0591-0597
[37]   Blockchain-Based Lightweight Authentication Protocol for Next-Generation Trustworthy Internet of Vehicles Communication [J].
Singh, Avaneesh ;
Rani, Preeti ;
Venkata Naga Ramesh, Janjhyam ;
Athawale, Shashikant V. ;
Hussein Alkhayyat, Ahmed ;
Aledaily, Arwa N. ;
Andre Prola, Thomas ;
Sharma, Rohit .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (02) :4898-4907
[38]   Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security [J].
Gupta, Daya Sagar ;
Ray, Sangram ;
Singh, Tajinder ;
Kumari, Madhu .
COMPUTER COMMUNICATIONS, 2022, 181 :69-79
[39]   Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions [J].
Alalwany, Easa ;
Mahgoub, Imad .
SENSORS, 2024, 24 (02)
[40]   A fog-driven three-factor authentication protocol for secure data sharing in Internet of Vehicles cyber-physical systems [J].
Katyal, Siddharth ;
Gupta, Shashank ;
Rawlley, Oshin ;
Ghosh, Debjani .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (08)