A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network

被引:0
|
作者
Xu, Peng [1 ,3 ]
Wang, Xiuzhen [1 ,3 ]
Chen, Meirong [1 ,2 ]
机构
[1] Natl Local Joint Engn Lab Syst Credibil Automat Ve, Chengdu 611756, Peoples R China
[2] Chengdu Text Coll, Chengdu 611731, Peoples R China
[3] Southwest Jiaotong Univ, Sch Math, Chengdu 611756, Peoples R China
关键词
Internet of vehicles; Authentication and key exchange protocol; Insecure channel; Formal verification; Real-or-random model; MUTUAL AUTHENTICATION; INTERNET; SCHEME;
D O I
10.1007/s44196-025-00754-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Vehicles technology has been widely applied in various communication scenarios, including vehicles to vehicles, vehicles to roadside facilities, vehicles to pedestrians, and vehicles to cloud. Owing to transmitting data through public channels, various security issues like identity leakage, man in the middle attack, key leakage and etc., are also introduced simultaneously and still challenging to be solved. Researches and practices have shown that authentication and key exchange protocols are effective methods to solve such security issues. However, most existing security protocols for Internet of Vehicles are established on the premise that the registration process is with a secure channel, which is usually not satisfied and deviates from practical applications. Accordingly, an authentication and key exchange protocol with an insecure channel has been proposed, in which the operations of symmetric encryption and XOR encryption are adopted for all interactive processes to improve protocol security. The theoretical analysis and formal verification demonstrate that the proposed protocol satisfies security properties including authentication and confidentiality, and reduces the costs of computation and communication compared with the method with public key encryption.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] A Secure and Efficient Authentication Protocol in Wireless Sensor Network
    Kakali Chatterjee
    Asok De
    Daya Gupta
    Wireless Personal Communications, 2015, 81 : 17 - 37
  • [22] Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET
    Wei, Guoheng
    Qin, Yanlin
    Fu, Wei
    EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2022, 2022, 1641 : 160 - 172
  • [23] A Secure and Efficient Authentication Protocol in Wireless Sensor Network
    Chatterjee, Kakali
    De, Asok
    Gupta, Daya
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (01) : 17 - 37
  • [24] An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
    Su, Xinzhong
    Xu, Youyun
    SENSORS, 2025, 25 (01)
  • [25] Toward Designing a Secure Authentication Protocol for IoT Environments
    Hosseinzadeh, Mehdi
    Malik, Mazhar Hussain
    Safkhani, Masoumeh
    Bagheri, Nasour
    Le, Quynh Hoang
    Tightiz, Lilia
    Mosavi, Amir H.
    SUSTAINABILITY, 2023, 15 (07)
  • [26] Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
    Nyangaresi, Vincent Omollo
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (04):
  • [27] A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles
    Xu, Zisang
    Li, Xiong
    Xu, Jianbo
    Liang, Wei
    Choo, Kim-Kwang Raymond
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 95
  • [28] Secure transmission and authentication protocol in IoT with deep-Q-net-key updation
    Kandasamy, Ramesh
    Dhandapani, Sheema
    Subbiyan, Balasubramani
    Gurumani, Vijaya
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2025, 48 (03) : 130 - 148
  • [29] A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC
    Qi, Mingping
    Chen, Jianhua
    Chen, Yitao
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2018, 164 : 101 - 109
  • [30] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Srinivas, Jangirala
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Kumari, Saru
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 875 - 895