DAME-IoV: Dynamic Adaptive Multi-Edge authentication protocol with post-quantum security for Internet of Vehicles

被引:0
作者
Rasheed, Iftikhar [1 ]
Mostafa, Hala [2 ]
机构
[1] Islamia Univ Bahawalpur, Dept Informat & Commun Engn, Bahawalpur, Pakistan
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
关键词
Internet of Vehicles; Post-quantum cryptography; Edge computing; Authentication protocol; Privacy preservation; Dynamic security; Lattice-based cryptography; EFFICIENT;
D O I
10.1016/j.vehcom.2025.100933
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Vehicles (IoV) faces increasing security challenges with the advent of quantum computing, which threatens traditional cryptographic protocols while demanding efficient authentication mechanisms for largescale vehicle networks. This paper presents DAME-IoV, a Dynamic Adaptive Multi-Edge authentication protocol that provides post-quantum security while leveraging edge computing capabilities for enhanced performance. Our framework introduces three key innovations: (1) a lightweight post-quantum authentication scheme optimized for vehicular networks, featuring lattice-based cryptography with dynamic parameter adjustment; (2) an adaptive security mechanism that dynamically adjusts protection levels based on real-time threat assessment and resource availability; and (3) an efficient edge-assisted processing architecture that enables scalable authentication through intelligent caching and batch verification. We provide formal security proofs demonstrating the protocol's resistance to quantum attacks while maintaining conditional privacy preservation. Extensive experimental evaluation on a prototype implementation shows that DAME-IoV achieves 45% lower computational overhead, 35% reduced memory footprint, and 40% better scaling efficiency compared to existing solutions. Performance analysis under various network conditions demonstrates that our framework maintains authentication latency below 50 ms while supporting over 1000 concurrent vehicle requests. The proposed solution successfully addresses the critical challenges of post-quantum security, scalability, and efficiency in IoV environments, providing a practical foundation for securing next-generation vehicular networks.
引用
收藏
页数:24
相关论文
共 83 条
[1]  
Alagic G., 2020, NIST Intern. Rep. 8309
[2]   An Efficient and Provably Secure ECC-Based Conditional Privacy-Preserving Authentication for Vehicle-to-Vehicle Communication in VANETs [J].
Ali, Ikram ;
Chen, Yong ;
Ullah, Niamat ;
Kumar, Rajesh ;
He, Wen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) :1278-1291
[3]   EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deboarh, Lazarus Jegatha .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) :2467-2476
[4]   On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side! [J].
Baee, Mir Ali Rezazadeh ;
Simpson, Leonie ;
Boyen, Xavier ;
Foo, Ernest ;
Pieprzyk, Josef .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 (16) :3678-3693
[5]  
Bernstein D.J., 2017, Post-Quantum Cryptography
[6]  
Bindel N., 2020, IEEE Trans. Dependable Secure Comput., V18, P2368
[7]  
Boneh D., 2020, SIAM J. Comput., V49, P1163
[8]  
Chen J., 2023, IEEE Internet Things J., V10, P5234
[9]  
Chen L, 2016, REPORT POSTQUANTUM C, DOI DOI 10.6028/NIST.IR.8105
[10]  
Chen M., 2023, IEEE Trans. Dependable Secure Comput., V20, P3456