An Efficient Lightweight Mutual Authentication and Key Exchange Protocol for Roaming Vehicle

被引:1
作者
Yadav, Kirti A. [1 ]
Vijayakumar, P. [1 ]
机构
[1] Vellore Inst Technol, Sch Elect Engn, Chennai 600127, Tamil Nadu, India
关键词
Authentication; computation cost; communication cost; intelligent transport system (ITS); privacy preservation; roaming; signature; trusted authority; vehicular adhoc network; PRIVACY-PRESERVING AUTHENTICATION; SECURE; SERVICES; SCHEME;
D O I
10.1109/ACCESS.2023.3276822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intelligent vehicles and their infrastructure have been a booming topic that requires attention towards grooming security services and providing a safe-secure drive experience to users worldwide. Authentication of these vehicles within and away from the home network plays an essential role in maintaining seamless service access, especially for users moving away from the home network. Traditional schemes are centralized and primarily focus on vehicle authentication within a home network. Very few studies have been conducted on vehicle authentication during roaming. The trusted authority (TA) must authenticate its vehicle along with the one in roaming, which increases the communication and computational load on the TA as scalability increases. This article presents a lightweight authentication scheme, especially for roaming vehicles, and focuses on sharing the authentication load. A vehicle, along with its home TA (HTA) identity, sends an authentication request to a nearby roadside unit (RSU) during roaming. After receiving an authentication request from the RSU, the foreign TA (FTA) connects to the HTA. Vehicle authenticity was confirmed as a session key generated for communication with a roaming vehicle, ensuring seamless service access. The proposed scheme was tested against standard BAN logic to prove that it meets the required security standards and authentication requirements. Furthermore, the communication and computation cost analysis proves that this scheme is lightweight compared with other traditional schemes. Security analysis proves that the proposed scheme can successfully prevent major attacks, such as anonymity, unlinkability, replay attack, message tampering, and malicious vehicle tracking.
引用
收藏
页码:49540 / 49548
页数:9
相关论文
empty
未找到相关数据