A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network

被引:0
|
作者
Xu, Peng [1 ,3 ]
Wang, Xiuzhen [1 ,3 ]
Chen, Meirong [1 ,2 ]
机构
[1] Natl Local Joint Engn Lab Syst Credibil Automat Ve, Chengdu 611756, Peoples R China
[2] Chengdu Text Coll, Chengdu 611731, Peoples R China
[3] Southwest Jiaotong Univ, Sch Math, Chengdu 611756, Peoples R China
关键词
Internet of vehicles; Authentication and key exchange protocol; Insecure channel; Formal verification; Real-or-random model; MUTUAL AUTHENTICATION; INTERNET; SCHEME;
D O I
10.1007/s44196-025-00754-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Vehicles technology has been widely applied in various communication scenarios, including vehicles to vehicles, vehicles to roadside facilities, vehicles to pedestrians, and vehicles to cloud. Owing to transmitting data through public channels, various security issues like identity leakage, man in the middle attack, key leakage and etc., are also introduced simultaneously and still challenging to be solved. Researches and practices have shown that authentication and key exchange protocols are effective methods to solve such security issues. However, most existing security protocols for Internet of Vehicles are established on the premise that the registration process is with a secure channel, which is usually not satisfied and deviates from practical applications. Accordingly, an authentication and key exchange protocol with an insecure channel has been proposed, in which the operations of symmetric encryption and XOR encryption are adopted for all interactive processes to improve protocol security. The theoretical analysis and formal verification demonstrate that the proposed protocol satisfies security properties including authentication and confidentiality, and reduces the costs of computation and communication compared with the method with public key encryption.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment
    Yang, Huibo
    Chen, Jianhua
    Zhang, Yuanyuan
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 1399 - 1409
  • [32] A fresh Two-party Authentication Key Exchange Protocol for Mobile Environment
    Yang, H. B.
    Chen, J. H.
    Zhang, Y. Y.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY AND MANAGEMENT SCIENCE (ITMS 2015), 2015, 34 : 933 - 936
  • [33] SYMMETRIC KEY BASED RFID AUTHENTICATION PROTOCOL WITH A SECURE KEY-UPDATING SCHEME
    Zhu, Guangyu
    Khan, Gul N.
    2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 353 - 357
  • [34] A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System
    Li, Xuanang
    Zheng, Zhiming
    Zhang, Xiao
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 275 - 281
  • [36] A seamless anonymous authentication protocol for mobile edge computing infrastructure
    Mahmood, Khalid
    Ayub, Muhammad Faizan
    Hassan, Syed Zohaib
    Ghaffar, Zahid
    Lv, Zhihan
    Chaudhry, Shehzad Ashraf
    COMPUTER COMMUNICATIONS, 2022, 186 : 12 - 21
  • [37] A secure and efficient user authentication protocol for wireless sensor network
    Kumar, Devender
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (18) : 27131 - 27154
  • [38] Combining Steganography and Biometric Cryptosystems for Secure Mutual Authentication and Key Exchange
    Al-Assam, Hisham
    Rashid, Rasber
    Jassim, Sabah
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 369 - 374
  • [39] A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments
    Son, Seunghwan
    Park, Yohan
    Park, Youngho
    SUSTAINABILITY, 2021, 13 (16)
  • [40] A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
    Wu, Tsu-Yang
    Yang, Lei
    Luo, Jia-Ning
    Wu, Jimmy Ming-Tai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021