VC-MAKA: Mutual Authentication and Key Agreement Protocol Based on Verifiable Commitment for Internet of Vehicles

被引:0
作者
He, Zhimin [1 ]
Tan, Weijie [2 ,3 ]
Long, Yangyang [2 ]
Chen, Yuling [2 ]
Niu, Kun [2 ]
Li, Chunguo [4 ]
Tan, Weiqiang [5 ,6 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, Guiyang 550025, Peoples R China
[2] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[3] Guizhou Univ, Key Lab Adv Mfg Technol, Minist Educ, Guiyang 550025, Peoples R China
[4] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Peoples R China
[5] Guizhou Univ, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[6] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 510006, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 24期
基金
中国国家自然科学基金;
关键词
Authentication; Security; Protocols; Internet of Things; Cryptography; Computational efficiency; Intelligent sensors; commitment; Internet of Vehicles (IoV); key Agreement; physical unclonable function (PUF); PRIVACY PROTECTION; SCHEME; BLOCKCHAIN; PUF;
D O I
10.1109/JIOT.2024.3457827
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Vehicles (IoV) is a specific instance of the Internet of Things (IoT) in the transportation field, driven by application requirements, such as intelligent traffic services and automatic vehicle control, can improve road safety and enhancing transmission efficiency. However, highly open networks tend to bring more security threats, and secure authentication becomes an important guarantee for reliable communication. Traditional IoT authentication and key agreement methods are costly, inefficient, and rely on the third-party trusted institutions, making them unsuitable for direct application in IoV systems. To meet the security authentication needs of IoV, and improve authentication efficiency and anonymity, this article proposes a verifiable commitment-based mutual authentication and key agreement protocol, called mutual authentication and key agreement protocol based on verifiable commitment (VC-MAKA). In VC-MAKA, we construct a verifiable commitment scheme where the verifier can verify the committed secret. Furthermore, based on this verifiable commitment scheme, we implement secure authentication and session key agreement, allowing vehicles to freely negotiate secure session keys and achieving conditional anonymous protection. Additionally, the proposed VC-MAKA also achieves rapid session key updates, enhancing the security of the session keys. We have conducted formal and informal security analysis, and the results show that VC-MAKA meets security requirements, such as mutual authentication, anonymity, traceability, and untraceability. Moreover, we have used the ProVerif tool for security experiment and performance comparison analysis, and the results indicate that compared to other schemes, the VC-MAKA protocol offers higher security and better efficiency.
引用
收藏
页码:41166 / 41181
页数:16
相关论文
共 42 条
  • [21] A PUF and Fuzzy Extractor-Based UAV-Ground Station and UAV-UAV Authentication Mechanism With Intelligent Adaptation of Secure Sessions
    Karmakar, Raja
    Kaddoum, Georges
    Akhrif, Ouassima
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 3858 - 3875
  • [22] A practical group blind signature scheme for privacy protection in smart grid
    Kong, Wei
    Shen, Jian
    Vijayakumar, Pandi
    Cho, Youngju
    Chang, Victor
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 136 : 29 - 39
  • [23] CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network
    Li, Dawei
    Liu, Di
    Ren, Yangkun
    Sun, Yu
    Guan, Zhenyu
    Wu, Qianhong
    Hu, Jiankun
    Liu, Jianwei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3487 - 3500
  • [24] Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm
    Liu, Yanbing
    Wang, Yuhang
    Chang, Guanghui
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (10) : 2740 - 2749
  • [25] Blockchain-Based Anonymous Authentication and Key Management for Internet of Things With Chebyshev Chaotic Maps
    Long, Yangyang
    Peng, Changgen
    Tan, Weijie
    Chen, Yuling
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (05) : 7883 - 7893
  • [26] PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey
    Mall, Priyanka
    Amin, Ruhul
    Das, Ashok Kumar
    Leung, Mark T.
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11): : 8205 - 8228
  • [27] BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs
    Maria, Azees
    Pandi, Vijayakumar
    Lazarus, Jeatha Deborah
    Karuppiah, Marimuthu
    Christo, Mary Subaja
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [28] An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network
    Moghadam, Mostafa Farhadi
    Nikooghadam, Mahdi
    Al Jabban, Maytham Azhar Baqer
    Alishahi, Mohammad
    Mortazavi, Leili
    Mohajerzadeh, Amirhossein
    [J]. IEEE ACCESS, 2020, 8 : 73182 - 73192
  • [29] A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
    Rao, Patruni Muralidhara
    Deebak, B. D.
    [J]. AD HOC NETWORKS, 2023, 146
  • [30] Adaptive Group-Based Zero Knowledge Proof-Authentication Protocol in Vehicular Ad Hoc Networks
    Rasheed, Amar A.
    Mahapatra, Rabi N.
    Hamza-Lup, Felix G.
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2020, 21 (02) : 867 - 881