A Provably Secure Identity Based Authenticated Key Agreement Protocol with Multiple PKG Compatibility for Inter-Vehicular Ad hoc Networks

被引:0
|
作者
Daniel R.M. [1 ]
Thomas A. [2 ]
机构
[1] Department of Computer Science and Engineering, Rajagiri School of Engineering and Technology, Kerala
[2] Department of Mathematics, Bishop Abraham Memorial College, Kerala
来源
Journal of Integrated Design and Process Science | 2022年 / 25卷 / 01期
关键词
Authenticated key agreement; eCK Security; gap Diffie-Hellman; multiple PKG compatibility; V2V communication;
D O I
10.3233/JID-200014
中图分类号
学科分类号
摘要
Vehicular Ad hoc Networks (VANETs) facilitate the timely dissemination of road traffic information, including early warnings related to road conditions, weather updates, traffic congestion and collisions. The information exchanged in VANETs is crucial for maintaining uninterrupted traffic flow, minimizing road mishaps, expediting emergency services and analyzing potential detours in case of congestion. In order to ensure the legitimacy of the interchanged messages and to preserve confidentiality, it is essential to establish secure authenticated channels among the communicating automotive nodes. Considering the highly dynamic nature of VANETs and the diversity of the participating vehicular nodes, Identity based Authenticated Key Agreement (ID-AKA) protocol in the multiple Private Key Generator (PKG) setting, is an ideal cryptographic technique for securing inter-vehicular communications. We cryptanalyze the existing pairing-free multiple PKG compatible ID-AKA (mPKG-ID-AKA) protocol designed for securing VANETs and prove that the protocol lacks weak Perfect Forward Secrecy (wPFS). Our investigations also reveal that previous attempts to model mPKG-ID-AKA protocols are computation-intensive and provide weaker security guarantees. To this end, we propose an efficient eCK secure mPKG-ID-AKA protocol based on the gap Diffie-Hellman assumption. Experimental analysis suggests that the proposed protocol attains the highest computation efficiency, when compared to the existing mPKG-ID-AKA schemes and is therefore highly suitable for securing inter-vehicular communications. © 2021 - IOS Press. All rights reserved.
引用
收藏
页码:55 / 77
页数:22
相关论文
共 50 条
  • [21] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [22] Provably Secure Cluster-based Group Key Agreement for Ad hoc Networks
    Zhou, Fucai
    Li, Hui
    Xu, Jian
    Yu, Bing
    IETE TECHNICAL REVIEW, 2010, 27 (03) : 228 - 234
  • [23] A provably secure authenticated key agreement protocol for wireless communications
    Guo, Hua
    Xu, Chang
    Mu, Yi
    Li, Zhoujun
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (03) : 563 - 572
  • [24] An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks
    Lim, Kiho
    Manivannan, D.
    VEHICULAR COMMUNICATIONS, 2016, 4 : 30 - 37
  • [25] Real-World Evaluation of an Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks
    Buettner, Carsten
    Bartels, Friederike
    Huss, Sorin A.
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 651 - 658
  • [26] Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    INFORMATION SCIENCES, 2011, 181 (19) : 4318 - 4329
  • [27] A three round authenticated group key agreement protocol for ad hoc networks
    Augot, Daniel
    Bhaskar, Raghav
    Issarny, Valerie
    Sacchetti, Daniele
    PERVASIVE AND MOBILE COMPUTING, 2007, 3 (01) : 36 - 52
  • [28] Blockchain-based group key agreement protocol for vehicular ad hoc networks
    Li, Xincheng
    Yin, Xinchun
    COMPUTER COMMUNICATIONS, 2022, 183 : 107 - 120
  • [29] Provably secure and efficient certificateless authenticated tripartite key agreement protocol
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1213 - 1221
  • [30] A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    Lu, Rongxing
    Cao, Zhenfu
    Wang, Licheng
    Sun, Congkai
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 521 - 527