Enhancing security and trust using efficient privacy-preserving authentication in vehicular edge computing networks

被引:0
作者
Ghani, Anwar [1 ,2 ]
Jan, Saeed Ullah [3 ]
Chaudhry, Shehzad Ashraf [4 ,5 ]
Ahmad, Rashid [6 ]
Das, Ashok Kumar [7 ,8 ]
Kim, Do Hyeun [2 ]
机构
[1] Int Islamic Univ Islamabad, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Jeju Natl Univ, Big Data Res Ctr, Dept Comp Engn, Jeju Si 63243, South Korea
[3] Govt Degree Coll, Dept Higher Educ, Wari Dir Upper 18200, Kpk, Pakistan
[4] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi 59911, U Arab Emirates
[5] Nisantasi Univ, Fac Engn & Architecture, Dept Software Engn, Istanbul, Turkiye
[6] Sohar Univ, Fac Comp & Informat Technol, Sohar 311, Oman
[7] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[8] Korea Univ, Coll Informat, Dept Comp Sci & Engn, 145 Anam Ro, Seoul 02841, South Korea
基金
新加坡国家研究基金会;
关键词
Edge computing; IoV; Authentication; Privacy; Vulnerability; Security; Cryptography; ATTRIBUTE-BASED SIGNATURE; MUTUAL AUTHENTICATION; INDUSTRIAL-INTERNET; KEY MANAGEMENT; PROTOCOL; SCHEME; VEHICLES; BLOCKCHAIN; DESIGN;
D O I
10.1016/j.vehcom.2025.100921
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Vehicles (IoV) requires advanced safety, security, and services in Intelligent Transportation Systems (ITS). Frequent broadcast message intervals and Dedicated Short-Range Communication (DSRC) make validating messages in such short timeframes extremely challenging. Additionally, current authentication protocols cannot meet the demands of the environment due to high communication and computational overheads. Furthermore, lightweight authentication proposals have been put forth to solve the problem; however, such attempts cannot provide a sophisticated solution that can handle advanced security needs and suffer from accuracy issues. This article presents a two-factor authentication protocol using lightweight cryptographic operations such as one-way hashing and exclusive OR (XOR) with acceptable efficiency and security. The identities are generated using Physically Unclonable Functions (PUFs), passwords, and randomized nonces to ensure two-factor authentication. The proposal is rigorously verified through formal security analysis, confirming that the protocol is untraceable, anonymous, protects key secrecy, and is resistant to well-known attacks in the IoV domain. The performance analysis confirms its robustness and reliability, with 43.31% low energy consumption in terms of computation, communication, and support for more security requirements, making it a feasible solution for the IoV domain.
引用
收藏
页数:17
相关论文
共 71 条
[1]   Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks [J].
Abduljabbar, Zaid Ameen ;
Nyangaresi, Vincent Omollo ;
Al Sibahee, Mustafa A. ;
Ghrabat, Mudhafar Jalil Jassim ;
Ma, Junchao ;
Abduljaleel, Iman Qays ;
Aldarwish, Abdulla J. Y. .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)
[2]  
Ahamed ABS, 2018, PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), P1320, DOI 10.1109/ICICCT.2018.8473110
[3]   An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing [J].
Akram, Waseem ;
Mahmood, Khalid ;
Li, Xiong ;
Sadiq, Mazhar ;
Lv, Zhihan ;
Chaudhry, Shehzad Ashraf .
COMPUTER NETWORKS, 2022, 217
[4]  
Al Amiri W., 2019, 2019 INT C SMART APP, P1
[5]   Two-Factor Privacy-Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks [J].
Al Sibahee, Mustafa A. ;
Nyangaresi, Vincent Omollo ;
Abduljabbar, Zaid Ameen ;
Luo, Chengwen ;
Zhang, Jin ;
Ma, Junchao .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08) :14253-14266
[6]   Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks [J].
Al-Shareeda, Mahmood A. ;
Anbar, Mohammed ;
Hasbullah, Iznan Husainy ;
Manickam, Selvakumar ;
Hanshi, Sabri M. .
IEEE ACCESS, 2020, 8 :144957-144968
[7]   A Lightweight Authentication and Attestation Scheme for In-Transit Vehicles in IoV Scenario [J].
Alladi, Tejasvi ;
Chakravarty, Sombuddha ;
Chamola, Vinay ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :14188-14197
[8]   A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles [J].
Aman, Muhammad Naveed ;
Javaid, Uzair ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) :1123-1139
[9]   AAKE-BIVT: Anonymous Authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation [J].
Badshah, Akhtar ;
Waqas, Muhammad ;
Muhammad, Fazal ;
Abbas, Ghulam ;
Abbas, Ziaul Haq ;
Chaudhry, Shehzad Ashraf ;
Chen, Sheng .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) :1739-1755
[10]  
Bagga P., 2023, Cyber Secur. Appl., V1