Three-factor authentication and key agreement protocol with collusion resistance in VANETs

被引:0
作者
Pan, Guanlin [1 ]
Tan, Haowen [2 ,3 ,4 ,5 ,6 ]
Zheng, Wenying [7 ]
Vijayakumar, P. [8 ]
Wu, Q. M. Jonathan [9 ]
Sivaraman, Audithan [10 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp Sci, Nanjing 214111, Jiangsu, Peoples R China
[2] Zhejiang Univ, Sch Cyber Sci & Technol, Hangzhou 310018, Peoples R China
[3] Zhejiang Sci Tech Univ, Zhejiang Prov Key Lab Digital Fash & Data Governan, Hangzhou 310018, Zhejiang, Peoples R China
[4] Zhejiang Sci Tech Univ, Zhejiang Prov Int Cooperat Base Sci & Technol Clou, Hangzhou 310018, Zhejiang, Peoples R China
[5] Zhejiang Prov Innovat Ctr Adv Text Technol, Shaoxing 312000, Zhejiang, Peoples R China
[6] Guangzhou Univ, Guangdong Key Lab Blockchain Secur, Guangzhou 510006, Guangdong, Peoples R China
[7] Zhejiang Sci Tech Univ, Sch Comp Sci & Technol, Hangzhou 310018, Zhejiang, Peoples R China
[8] JJ Coll Engn & Technol, Dept Informat Technol, Tiruchirappalli 620009, Tamil Nadu, India
[9] Univ Windsor, Dept Elect & Comp Engn, Windsor SL4 3BB, ON, Canada
[10] Madan Mohan Malaviya Univ Technol, Gorakhpur 273010, India
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Three-factor authentication; Access control for multiple-vehicle; Aggregate signature; Collusion attack; VANETs; CERTIFICATELESS AGGREGATE SIGNATURE; ATTRIBUTE-BASED SIGNATURE; INDUSTRIAL-INTERNET; SCHEME;
D O I
10.1016/j.jisa.2025.104029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In vehicular ad hoc networks (VANETs), vehicles possess the capability to interact efficiently with a diverse array of services and applications provided by edge vehicular infrastructures. Concurrently, the ongoing interactions among vehicles facilitate the real-time acquisition of crucial road information. However, these vehicular communications primarily occur over unsecured public channels, rendering confidential data susceptible to illegal access by malicious entities. To address this security concern, numerous cryptographic schemes, including the widespread adoption of multi-factor authentication techniques, have been introduced. Despite these efforts, the existing authentication methods are limited, as they solely focus on verifying the legitimacy of individual users, resulting in restricted functionality and diminished security capabilities. So, three-factor authentication and key agreement protocol with collusion resistance in VANETs (TFA-CR) in this paper is developed, which also ensures resistance against collusion attacks. In the proposed design, we leverage hybrid characteristics that encompass both vehicle and user attributes, such as user identity, user-defined parameters, and vehicular verification codes. These attributes are efficiently extracted and utilized throughout the subsequent authentication process, creating a distinctive authentication mechanism tailored for real-world multi-vehicle scenarios. This enables seamless network access for individual users across different vehicles using only a single smart card. A thorough performance evaluation reveals that the protocol effectively reduces both communication overhead and computational complexity when compared to existing authentication techniques.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion
    Wu, Fan
    Li, Xiong
    Xu, Lili
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 1120 - 1129
  • [32] Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems
    Zhang, Liping
    Zhu, Yue
    Ren, Wei
    Zhang, Yixin
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (02) : 1324 - 1333
  • [33] A secure three-factor-based authentication with key agreement protocol for e-Health clouds
    Chen, Yulei
    Chen, Jianhua
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (04) : 3359 - 3380
  • [34] A privacy preserving three-factor authentication protocol for e-Health clouds
    Jiang, Qi
    Khan, Muhammad Khurram
    Lu, Xiang
    Ma, Jianfeng
    He, Debiao
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (10) : 3826 - 3849
  • [35] An authentication and key agreement protocol for satellite communications
    Chang, Chin-Chen
    Cheng, Ting-Fang
    Wu, Hsiao-Ling
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1994 - 2006
  • [36] Comments on “A privacy preserving three-factor authentication protocol for e-health clouds”
    Azeem Irshad
    Shehzad Ashraf Chaudhry
    The Journal of Supercomputing, 2017, 73 : 1504 - 1508
  • [37] Comments on a Secure and Efficient Three-Factor Authentication Protocol Using Honey List for WSN
    Lee, Xuanang
    Yang, Lei
    Zhang, Zhenzhou
    Wu, Tsu-Yang
    Chen, Chien-Ming
    ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING (ECC 2021), 2022, 268 : 359 - 365
  • [38] Comments on "A privacy preserving three-factor authentication protocol for e-health clouds"
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    JOURNAL OF SUPERCOMPUTING, 2017, 73 (04) : 1504 - 1508
  • [39] User centric three-factor authentication protocol for cloud-assisted wearable devices
    Jiang, Qi
    Qian, Yuanyuan
    Ma, Jianfeng
    Ma, Xindi
    Cheng, Qingfeng
    Wei, Fushan
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (06)
  • [40] BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs
    Xu, Guangquan
    Li, Xiaotong
    Jiao, Litao
    Wang, Weizhe
    Liu, Ao
    Su, Chunhua
    Zheng, Xi
    Liu, Shaoying
    Cheng, Xiaochun
    IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (07) : 35 - 41