Mutual Authentication Protocols Based on PUF and Multitrusted Authority for Internet of Vehicles

被引:0
作者
Yang, Yuting [1 ]
Tan, Weijie [1 ,2 ]
Li, Zhen [3 ]
Chen, Yuling [1 ]
Li, Chunguo [4 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Guizhou Univ, Key Lab Adv Mfg Technol, Minist Educ, Guiyang 550025, Peoples R China
[3] Guizhou Univ, Coll Big Data & Informat Engn, Guiyang 550025, Peoples R China
[4] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 24期
基金
中国国家自然科学基金;
关键词
Protocols; Authentication; Security; Physical unclonable function; Noise; Internet of Things; Resists; Fuzzy extractor; Internet of Vehicle (IoV); multitrusted authority (TA); mutual authentication; physical unclonable function (PUF); SECURITY;
D O I
10.1109/JIOT.2024.3449901
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Vehicles (IoV) is a critical component of the transportation field, which can greatly facilitate the current transportation system. Meanwhile, more and more vehicles connect to the IoV and the security and privacy need to be guaranteed. Traditional authentication protocols based on bilinear pairs are computatively heavy and difficult to protect user identity and privacy in IoV environment. In addition, most existing protocols only consider the authentication between vehicles and infrastructure, but not consider between vehicles and vehicles, as well as single point of failure in the traditional single trusted authority (TA). To address these issues, this article proposes two lightweight mutual authentication protocols (MAPs) based on physical unclonable function (PUF) and multi-TA. The first protocol named V2I-MAP and is applied to vehicle-to-infrastructure (V2I) communication. The second is named V2V-MAP and is applied to vehicle-to-vehicle (V2V) communication. The protocols solve the interference of noise on PUF signals by fuzzy extractor, reduce the communication overhead and computation overhead of vehicles by utilizing PUF's lightweight computation characteristics, deal with the problems of impersonation attack with the help of the unclonable characteristics of PUF, and work out single TA single point of failure problems with the multi-TA model. Finally, the security analysis and informal security analysis of the proposed protocols are demonstrates that the proposed protocols meet the security requirements of the IoV system. ProVerif is used to verify the security of the protocols. Performance analysis shows that the protocols can reduce the communication and computation overhead than the comparable protocols.
引用
收藏
页码:40086 / 40099
页数:14
相关论文
共 31 条
  • [1] Security analysis on "Three-factor authentication protocol using physical unclonable function for IoV"
    Ahmim, Ilyes
    Ghoualmi-Zine, Nacira
    Ahmim, Ahmed
    Ahmim, Marwa
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (05) : 1019 - 1026
  • [2] A Lightweight Authentication and Attestation Scheme for In-Transit Vehicles in IoV Scenario
    Alladi, Tejasvi
    Chakravarty, Sombuddha
    Chamola, Vinay
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) : 14188 - 14197
  • [3] A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
    Aman, Muhammad Naveed
    Javaid, Uzair
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 1123 - 1139
  • [4] Mutual Authentication in IoT Systems Using Physical Unclonable Functions
    Aman, Muhammad Naveed
    Chua, Kee Chaing
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1327 - 1340
  • [5] PUF-Based Privacy-Preserving Simultaneous Authentication Among Multiple Vehicles in VANET
    Awais, Syed Muhammad
    Yucheng, Wu
    Mahmood, Khalid
    Akram, Muhammad Wahid
    Hussain, Shafiq
    Das, Ashok Kumar
    Park, Youngho
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (05) : 6727 - 6739
  • [6] End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
    Aysu, Aydin
    Gulcan, Ege
    Moriyama, Daisuke
    Schaumont, Patrick
    Yung, Moti
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 556 - 576
  • [7] Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. IEEE ACCESS, 2019, 7 : 85627 - 85644
  • [8] Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function
    Bansal, Gaurang
    Naren, Naren
    Chamola, Vinay
    Sikdar, Biplab
    Kumar, Neeraj
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (07) : 7234 - 7246
  • [9] PUF Based Authentication Protocol for IoT
    Braeken, An
    [J]. SYMMETRY-BASEL, 2018, 10 (08):
  • [10] Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453