Password authenticated key exchange protocol in electronic vehicle key enviromment

被引:0
作者
Ming Y. [1 ]
Zou J. [1 ]
Shen T. [1 ]
机构
[1] School of Electronic Engineering, Beijing University of Posts and Telecommunication, Beijing
来源
Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics | 2021年 / 47卷 / 04期
基金
中国国家自然科学基金;
关键词
Authentication key exchange protocol; Blind signature; Digital key; Identity authentication; Security model;
D O I
10.13700/j.bh.1001-5965.2020.0246
中图分类号
学科分类号
摘要
The rapid development of Internet of vehicles has promoted the research and development of digital key. In order to solve the communication security problem between digital key and car locks, a security model and password authentication key exchange protocol are proposed. The protocol completes the authentication between the digital key and the car lock through the assistance of the smartphone. Even if the smartphone is attacked by malicious code or is lost, the protocol can protect the privacy of the user. The security proof and performance analysis of the protocol under the security model show that the protocol can resist dictionary attacks, man-in-the-middle attacks, replay attacks, malicious code attacks, disguise attacks, internal attacks, etc. The performance of this protocol in computing consumption is better than that of other protocols of the same type, reducing the total computing consumption by 50.7%. © 2021, Editorial Board of JBUAA. All right reserved.
引用
收藏
页码:698 / 705
页数:7
相关论文
共 25 条
[11]  
CHALLA S, DAS A, ODELU V, Et al., An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks, Computers and Electrical Engineering, 69, pp. 534-554, (2017)
[12]  
LI X, NIU J, KUMARI S, Et al., A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments, Journal of Network and Computer Applications, 103, pp. 194-204, (2018)
[13]  
WAZID M, DAS A, ODELU V, Et al., Design of secure user authenticated key management protocol for generic IoT networks, IEEE Internet of Things Journal, 5, 1, pp. 269-282, (2018)
[14]  
DAMMAK M, BOUDIA O, MESSOUS M, Et al., Token-based lightweight authentication to secure IoT networks, Proceedings 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1-4, (2019)
[15]  
DONG X L, LI M H, DU Y, Et al., A biometric verification based authentication scheme using Chebyshev chaotic mapping, Journal of Beijing University of Aeronautics and Astronautics, 45, 5, pp. 1052-1058, (2019)
[16]  
TAHER B, JIANG S, YASSIN A, Et al., Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction, IEEE Access, 7, pp. 148950-148966, (2019)
[17]  
AN D, YANG C, JIANG Q., A new password authentication method based on fingerprint and mobile phone assistance, Journal of Computer Research and Development, 53, 10, pp. 2400-2411, (2016)
[18]  
ZHANG R, XIAO Y, SUN S, Et al., Efficient multi-factor authenticated key exchange scheme for mobile communications, IEEE Transactions on Dependable and Secure Computing, 16, 4, pp. 625-634, (2019)
[19]  
ARSHAD H, NIKOOGHADAM M., An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC, Multimedia Tools and Applications, 75, 1, pp. 181-197, (2016)
[20]  
LIN H, WEN F, DU C., An anonymous and secure authentication and key agreement scheme for session initiation protocol, Multimedia Tools and Applications, 76, 2, pp. 2315-2329, (2017)