Secure and Efficient Authentication and Key Agreement Scheme for Multicast Services in 5G Vehicular to Everything

被引:0
|
作者
Zhang, Yinghui [1 ]
Li, Guoteng [1 ]
Han, Gang [1 ]
Cao, Jin [2 ]
Zheng, Dong [1 ]
机构
[1] School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an,710121, China
[2] School of Cyber Engineering, Xidian University, Xi’an,710071, China
关键词
D O I
10.11999/JEIT231118
中图分类号
学科分类号
摘要
In 5G Vehicular to Everything (5G-V2X), service messages are provided to a group of vehicles belonging to a specific region by means of point-to-multipoint transmission. To address security threats and privacy leakage, an authentication and key negotiation scheme is proposed for multicast service message transmission between content providers and vehicles. A certificate-less aggregated signature technique is used to batch-verify all vehicles in the group, and improves the efficiency of authentication requests. Secure key negotiation is realized based on the polynomial key management technique, which makes it impossible for illegal users or the core network to obtain the shared session key. Finally, a dynamic key update mechanism for vehicles in the group is implemented, so that when a vehicle joins or leaves the group, the content provider only needs to send a key update message to update the session key. The proposed scheme can guarantee security requirements such as anonymity, unlinkability, forward and backward security, and resistance to conspiracy attacks, as shown by formal verification tools and further security analysis. The computational efficiency is improved by about 34.2% compared to existing schemes. © 2024 Science Press. All rights reserved.
引用
收藏
页码:3026 / 3035
相关论文
共 50 条
  • [21] A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Qu, Juan
    Feng, Yuming
    Huang, Yi
    ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34): : 101 - 112
  • [22] On the Security of a Secure and Computationally Efficient Authentication and Key Agreement Scheme for Internet of Vehicles
    Park, Kisung
    Kim, Myeonghyun
    Park, Youngho
    ELECTRONICS, 2024, 13 (16)
  • [23] Security analysis of 5G authentication and key agreement protocol
    Jia F.
    Yan Y.
    Yuan K.
    Zhao L.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2021, 61 (11): : 1260 - 1266
  • [24] Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services
    Gope, Prosanta
    Hsu, Ruei-Hau
    Lee, Jemin
    Quek, Tony Q. S.
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 247 - 252
  • [25] SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks
    Irshad, Azeem
    Alreshoodi, Mohammed
    IEEE ACCESS, 2024, 12 : 49062 - 49077
  • [26] A Secure User Anonymity-Preserving Biometrics and PUF-Based Multiserver Authentication Scheme With Key Agreement in 5G Networks
    Xu, Deqin
    Bian, Weixin
    Li, Qingde
    Xie, Dong
    Zhao, Jun
    Hu, Yao
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5170 - 5184
  • [27] An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks
    Gharsallah, Ikram
    Smaoui, Salima
    Zarai, Faouzi
    IET INFORMATION SECURITY, 2020, 14 (01) : 21 - 29
  • [28] Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network
    Palit, Sudip Kumar
    Chakraborty, Mohuya
    Chakraborty, Subhalaxmi
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (04): : 3902 - 3935
  • [29] Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network
    Sudip Kumar Palit
    Mohuya Chakraborty
    Subhalaxmi Chakraborty
    The Journal of Supercomputing, 2023, 79 : 3902 - 3935
  • [30] Provably secure anonymous authentication key agreement protocol for multicast group
    Feng T.
    Liu Y.-Y.
    Ma J.-F.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (02): : 273 - 277