Three-factor authentication and key agreement protocol with collusion resistance in VANETs

被引:0
作者
Pan, Guanlin [1 ]
Tan, Haowen [2 ,3 ,4 ,5 ,6 ]
Zheng, Wenying [7 ]
Vijayakumar, P. [8 ]
Wu, Q. M. Jonathan [9 ]
Sivaraman, Audithan [10 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp Sci, Nanjing 214111, Jiangsu, Peoples R China
[2] Zhejiang Univ, Sch Cyber Sci & Technol, Hangzhou 310018, Peoples R China
[3] Zhejiang Sci Tech Univ, Zhejiang Prov Key Lab Digital Fash & Data Governan, Hangzhou 310018, Zhejiang, Peoples R China
[4] Zhejiang Sci Tech Univ, Zhejiang Prov Int Cooperat Base Sci & Technol Clou, Hangzhou 310018, Zhejiang, Peoples R China
[5] Zhejiang Prov Innovat Ctr Adv Text Technol, Shaoxing 312000, Zhejiang, Peoples R China
[6] Guangzhou Univ, Guangdong Key Lab Blockchain Secur, Guangzhou 510006, Guangdong, Peoples R China
[7] Zhejiang Sci Tech Univ, Sch Comp Sci & Technol, Hangzhou 310018, Zhejiang, Peoples R China
[8] JJ Coll Engn & Technol, Dept Informat Technol, Tiruchirappalli 620009, Tamil Nadu, India
[9] Univ Windsor, Dept Elect & Comp Engn, Windsor SL4 3BB, ON, Canada
[10] Madan Mohan Malaviya Univ Technol, Gorakhpur 273010, India
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Three-factor authentication; Access control for multiple-vehicle; Aggregate signature; Collusion attack; VANETs; CERTIFICATELESS AGGREGATE SIGNATURE; ATTRIBUTE-BASED SIGNATURE; INDUSTRIAL-INTERNET; SCHEME;
D O I
10.1016/j.jisa.2025.104029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In vehicular ad hoc networks (VANETs), vehicles possess the capability to interact efficiently with a diverse array of services and applications provided by edge vehicular infrastructures. Concurrently, the ongoing interactions among vehicles facilitate the real-time acquisition of crucial road information. However, these vehicular communications primarily occur over unsecured public channels, rendering confidential data susceptible to illegal access by malicious entities. To address this security concern, numerous cryptographic schemes, including the widespread adoption of multi-factor authentication techniques, have been introduced. Despite these efforts, the existing authentication methods are limited, as they solely focus on verifying the legitimacy of individual users, resulting in restricted functionality and diminished security capabilities. So, three-factor authentication and key agreement protocol with collusion resistance in VANETs (TFA-CR) in this paper is developed, which also ensures resistance against collusion attacks. In the proposed design, we leverage hybrid characteristics that encompass both vehicle and user attributes, such as user identity, user-defined parameters, and vehicular verification codes. These attributes are efficiently extracted and utilized throughout the subsequent authentication process, creating a distinctive authentication mechanism tailored for real-world multi-vehicle scenarios. This enables seamless network access for individual users across different vehicles using only a single smart card. A thorough performance evaluation reveals that the protocol effectively reduces both communication overhead and computational complexity when compared to existing authentication techniques.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices
    Wang, Zhenyu
    Deng, Ding
    Hou, Shen
    Guo, Yang
    Li, Shaoqing
    COMPUTER COMMUNICATIONS, 2023, 203 : 1 - 14
  • [22] A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
    Sammoud, Amal
    Chalouf, Mohamed Aymen
    Hamdi, Omessaad
    Montavont, Nicolas
    Bouallegue, Ammar
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1916 - 1921
  • [23] A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Odelu, Vanga
    Ahmad, Awais
    Shin, Ji Sun
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (02) : 661 - 680
  • [24] A secure and efficient three-factor authentication protocol for IoT environments
    Li, Yi
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 179
  • [25] A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
    Yu, SungJin
    Lee, JoonYoung
    Park, YoHan
    Park, YoungHo
    Lee, SangWoo
    Chung, BoHeung
    APPLIED SCIENCES-BASEL, 2020, 10 (10):
  • [26] A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT
    Kou, Liang
    Shi, Yiqi
    Zhang, Liguo
    Liu, Duo
    Yang, Qing
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 58 (02): : 545 - 565
  • [27] A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks
    Wu, Tsu-Yang
    Yang, Lei
    Lee, Zhiyuan
    Chu, Shu-Chuan
    Kumari, Saru
    Kumar, Sachin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [28] A lightweight three-factor authentication protocol for digital rights management system
    Yu, SungJin
    Park, KiSung
    Park, YoHan
    Kim, HyungPyo
    Park, YoungHo
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1340 - 1356
  • [29] Anonymous three-factor authenticated key agreement for wireless sensor networks
    Lu, Yanrong
    Xu, Guangquan
    Li, Lixiang
    Yang, Yixian
    WIRELESS NETWORKS, 2019, 25 (04) : 1461 - 1475
  • [30] Three-factor authentication protocol using physical unclonable function for IoV
    Jiang, Qi
    Zhang, Xin
    Zhang, Ning
    Tian, Youliang
    Ma, Xindi
    Ma, Jianfeng
    COMPUTER COMMUNICATIONS, 2021, 173 : 45 - 55