Three-factor authentication and key agreement protocol with collusion resistance in VANETs

被引:0
作者
Pan, Guanlin [1 ]
Tan, Haowen [2 ,3 ,4 ,5 ,6 ]
Zheng, Wenying [7 ]
Vijayakumar, P. [8 ]
Wu, Q. M. Jonathan [9 ]
Sivaraman, Audithan [10 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp Sci, Nanjing 214111, Jiangsu, Peoples R China
[2] Zhejiang Univ, Sch Cyber Sci & Technol, Hangzhou 310018, Peoples R China
[3] Zhejiang Sci Tech Univ, Zhejiang Prov Key Lab Digital Fash & Data Governan, Hangzhou 310018, Zhejiang, Peoples R China
[4] Zhejiang Sci Tech Univ, Zhejiang Prov Int Cooperat Base Sci & Technol Clou, Hangzhou 310018, Zhejiang, Peoples R China
[5] Zhejiang Prov Innovat Ctr Adv Text Technol, Shaoxing 312000, Zhejiang, Peoples R China
[6] Guangzhou Univ, Guangdong Key Lab Blockchain Secur, Guangzhou 510006, Guangdong, Peoples R China
[7] Zhejiang Sci Tech Univ, Sch Comp Sci & Technol, Hangzhou 310018, Zhejiang, Peoples R China
[8] JJ Coll Engn & Technol, Dept Informat Technol, Tiruchirappalli 620009, Tamil Nadu, India
[9] Univ Windsor, Dept Elect & Comp Engn, Windsor SL4 3BB, ON, Canada
[10] Madan Mohan Malaviya Univ Technol, Gorakhpur 273010, India
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Three-factor authentication; Access control for multiple-vehicle; Aggregate signature; Collusion attack; VANETs; CERTIFICATELESS AGGREGATE SIGNATURE; ATTRIBUTE-BASED SIGNATURE; INDUSTRIAL-INTERNET; SCHEME;
D O I
10.1016/j.jisa.2025.104029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In vehicular ad hoc networks (VANETs), vehicles possess the capability to interact efficiently with a diverse array of services and applications provided by edge vehicular infrastructures. Concurrently, the ongoing interactions among vehicles facilitate the real-time acquisition of crucial road information. However, these vehicular communications primarily occur over unsecured public channels, rendering confidential data susceptible to illegal access by malicious entities. To address this security concern, numerous cryptographic schemes, including the widespread adoption of multi-factor authentication techniques, have been introduced. Despite these efforts, the existing authentication methods are limited, as they solely focus on verifying the legitimacy of individual users, resulting in restricted functionality and diminished security capabilities. So, three-factor authentication and key agreement protocol with collusion resistance in VANETs (TFA-CR) in this paper is developed, which also ensures resistance against collusion attacks. In the proposed design, we leverage hybrid characteristics that encompass both vehicle and user attributes, such as user identity, user-defined parameters, and vehicular verification codes. These attributes are efficiently extracted and utilized throughout the subsequent authentication process, creating a distinctive authentication mechanism tailored for real-world multi-vehicle scenarios. This enables seamless network access for individual users across different vehicles using only a single smart card. A thorough performance evaluation reveals that the protocol effectively reduces both communication overhead and computational complexity when compared to existing authentication techniques.
引用
收藏
页数:15
相关论文
共 50 条
  • [11] Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps
    Hu, Jiaxi
    Xu, Zhiqiang
    He, Debiao
    Zeadally, Sherali
    Choo, Kim-Kwang Raymond
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 186 - 202
  • [12] An Improved Secure Remote Login Protocol with Three-Factor Authentication
    Tiwari, Minu
    Panda, Soumyashree S.
    Biswas, G. P.
    2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016, : 365 - 371
  • [13] Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles
    Jiang, Qi
    Zhang, Ning
    Ni, Jianbing
    Ma, Jianfeng
    Ma, Xindi
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (09) : 9390 - 9401
  • [14] A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks
    Xu, Lili
    Wu, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3428 - 3443
  • [15] A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes
    Shin, Sooyeon
    Kwon, Taekyoung
    SENSORS, 2019, 19 (09)
  • [16] A secure three-factor authentication protocol for mobile networks
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [17] An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
    Challa, Sravani
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Kumari, Saru
    Khan, Muhammad Khurram
    Vasilakos, Athanasios V.
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 534 - 554
  • [18] Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement
    Zhang, Liping
    Zhang, Yixin
    Tang, Shanyu
    Luo, He
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (03) : 2795 - 2805
  • [19] Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
    Park, YoHan
    Park, YoungHo
    SENSORS, 2016, 16 (12)
  • [20] Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things
    Xu, Hang
    Hsu, Chingfang
    Harn, Lein
    Cui, Janqun
    Zhao, Zhuo
    Zhang, Ze
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 3000 - 3013