CPAHP: Conditional Privacy-Preserving Authentication Scheme With Hierarchical Pseudonym for 5G-Enabled IoV

被引:10
|
作者
Liu, Jingwei [1 ]
Peng, Chuntian [1 ]
Sun, Rong [2 ]
Liu, Lei [3 ]
Zhang, Ning [4 ]
Dustdar, Schahram [5 ]
Leung, Victor C. M. [6 ,7 ]
机构
[1] Xidian Univ, Shaanxi Key Lab Blockchain & Secure Comp, Xian 710071, Peoples R China
[2] Xidian Univ, State Key Lab ISN, Xian 710071, Peoples R China
[3] Xidian Guangzhou Inst Technol, Guangzhou 510555, Peoples R China
[4] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
[5] Tech Univ Wien, Distributed Syst Grp, A-1040 Vienna, Austria
[6] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
[7] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
关键词
IoV; Conditional Privacy-Preservation; Anonymous Authentication; 5G; Blockchain; SECURE;
D O I
10.1109/TVT.2023.3246466
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a representative application scenario of the Internet of Things (IoT), the Internet of Vehicles (IoV) plays an important function in the area of intelligent transportation. However, data traffic exchanged in IoV is usually correlated with plenty of sensitive information, thus leading to privacy leakage. Nevertheless, if all personal data about vehicles are completely protected, it will be hard to trace the real identities of malicious vehicles, which also raises other security issues in IoV. In addition, existing schemes are not fully suitable for 5G-enabled IoV due to their complex structure and high computation requirements. In order to realize more efficient communication and anonymous authentication of vehicles with superior security, we propose a conditional privacy-preserving authentication scheme with hierarchical pseudonyms (CPAHP) in 5G-enabled IoV, which is based on the elliptic curve Diffie-Hellman (ECDH) problem. Through the hierarchical pseudonym mechanism, CPAHP can protect the real identities and movement tracks of vehicles. Whereas, if vehicles have malicious behaviors, their real identities can be recovered through the corresponding pseudonyms. Furthermore, by taking advantage of a batch verification method, receivers can easily cope with a huge influx of messages in a short space of time. Moreover, by introducing blockchain technology, traffic information can be shared smoothly among all vehicles. Through the security analysis and performance evaluation, it is demonstrated that CPAHP can not only meet the security requirements but also provide higher computational efficiency.
引用
收藏
页码:8929 / 8940
页数:12
相关论文
共 50 条
  • [1] Conditional Privacy-Preserving Multi-Domain Authentication and Pseudonym Management for 6G-Enabled IoV
    Cheng, Guanjie
    Huang, Junqin
    Wang, Yewei
    Zhao, Jun
    Kong, Linghe
    Deng, Shuiguang
    Yan, Xueqiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 10206 - 10220
  • [2] Conditional Privacy-Preserving Authentication Scheme for IoV Based on ECC
    Xie, Peng-Shou
    Pan, Xiao-Jie
    Wang, Hong
    Wang, Jia-Lu
    Feng, Tao
    Yan, Yan
    International Journal of Network Security, 2022, 24 (03) : 501 - 510
  • [3] CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    Mohammed, Badiea Abdulkarem
    Al-Mekhlafi, Zeyad Ghaleb
    Qtaish, Amjad
    Alzahrani, Abdullah J.
    Alshammari, Gharbi
    Sallam, Amer A.
    Almekhlafi, Khalil
    SENSORS, 2022, 22 (13)
  • [4] A Privacy-Preserving Authentication and Pseudonym Revocation Scheme for VANETs
    Qi, Jiayu
    Gao, Tianhan
    IEEE ACCESS, 2020, 8 : 177693 - 177707
  • [5] L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system
    Almazroi, Abdulwahab Ali
    Alqarni, Mohammed A.
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    PLOS ONE, 2023, 18 (10):
  • [6] Lightweight privacy-preserving authentication mechanism in 5G-enabled industrial cyber physical systems
    Xiang, Xinyin
    Cao, Jin
    Fan, Weiguo
    INFORMATION SCIENCES, 2024, 666
  • [7] Lightweight privacy-preserving authentication mechanism in 5G-enabled industrial cyber physical systems
    Xiang, Xinyin
    Cao, Jin
    Fan, Weiguo
    Information Sciences, 2024, 666
  • [8] APPAS: A Privacy-Preserving Authentication Scheme Based on Pseudonym Ring in VSNs
    Gao, Tianhan
    Deng, Xinyang
    Li, Qingshan
    Collotta, Mario
    You, Ilsun
    IEEE ACCESS, 2019, 7 : 69936 - 69946
  • [9] Hybrid conditional privacy-preserving authentication scheme for VANETs
    Shibin Wang
    Kele Mao
    Furui Zhan
    Dong Liu
    Peer-to-Peer Networking and Applications, 2020, 13 : 1600 - 1615
  • [10] Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks
    Zhang, Jing
    Zhong, Hong
    Cui, Jie
    Tian, Miaomiao
    Xu, Yan
    Liu, Lu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (07) : 7940 - 7954