Password authenticated key exchange protocol in electronic vehicle key enviromment

被引:0
作者
Ming Y. [1 ]
Zou J. [1 ]
Shen T. [1 ]
机构
[1] School of Electronic Engineering, Beijing University of Posts and Telecommunication, Beijing
来源
Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics | 2021年 / 47卷 / 04期
基金
中国国家自然科学基金;
关键词
Authentication key exchange protocol; Blind signature; Digital key; Identity authentication; Security model;
D O I
10.13700/j.bh.1001-5965.2020.0246
中图分类号
学科分类号
摘要
The rapid development of Internet of vehicles has promoted the research and development of digital key. In order to solve the communication security problem between digital key and car locks, a security model and password authentication key exchange protocol are proposed. The protocol completes the authentication between the digital key and the car lock through the assistance of the smartphone. Even if the smartphone is attacked by malicious code or is lost, the protocol can protect the privacy of the user. The security proof and performance analysis of the protocol under the security model show that the protocol can resist dictionary attacks, man-in-the-middle attacks, replay attacks, malicious code attacks, disguise attacks, internal attacks, etc. The performance of this protocol in computing consumption is better than that of other protocols of the same type, reducing the total computing consumption by 50.7%. © 2021, Editorial Board of JBUAA. All right reserved.
引用
收藏
页码:698 / 705
页数:7
相关论文
共 25 条
[1]  
BELLOVIN S M, METTITT M., Encrypted key exchange: Password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 72-84, (1992)
[2]  
WANG D, WANG N, WANG P, Et al., Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity, Information Sciences, 321, pp. 162-178, (2015)
[3]  
XIE Q, WONG D, WANG G, Et al., Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model, IEEE Transactions on Information Forensics and Security, 12, 6, pp. 1382-1392, (2017)
[4]  
LI X, YANG D, ZENG X, Et al., Comments on "Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model, IEEE Transactions on Information Forensics and Security, 14, 12, pp. 3344-3345, (2019)
[5]  
REDDY A, YOON E, DAS A, Et al., Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment, IEEE Access, 5, pp. 3622-3639, (2017)
[6]  
LI W, LI X, GAO J, Et al., Design of secure authenticated key management protocol for cloud computing environments, IEEE Transactions on Dependable and Secure Computing, (2019)
[7]  
XIAO L, DENG Y, BEN C, Et al., Two-factor authentication key agreement protocol based on biometric feature and password, Journal on Communications, 38, 7, pp. 89-95, (2017)
[8]  
DHILLON P, KALRA S., Lightweight biometrics based remote user authentication scheme for IoT services, Journal of Information Security and Applications, 34, pp. 255-270, (2017)
[9]  
CHEN C, XU L, FANG W, Et al., A three-party password authenticated key exchange protocol resistant to stolen smart card attacks, Advances in Intelligent Information Hiding and Multimedia Signal Processing, 63, pp. 331-336, (2017)
[10]  
OM H, BANERIEE S., A password authentication method for remote users based on smart card and biometrics, Journal of Discrete Mathematical Sciences and Cryptography, 20, 3, pp. 595-610, (2017)