A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles

被引:46
作者
Xu, Zisang [1 ]
Li, Xiong [2 ]
Xu, Jianbo [3 ]
Liang, Wei [4 ]
Choo, Kim-Kwang Raymond [5 ]
机构
[1] Changsha Univ Sci & Technol, Comp & Commun Engineer Inst, Changsha 410114, Hunan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Inst Cyber Secur, Chengdu 611731, Peoples R China
[3] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Hunan, Peoples R China
[4] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Internet of Vehicles; Authentication; Key agreement; Security; PROTOCOL;
D O I
10.1016/j.compeleceng.2021.107409
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet of Vehicles (IoV), the communication between vehicles and RoadSide Units (RSUs) usually through wireless channels. Therefore, the IoV requires a reliable and secure authentication and key agreement scheme to ensure that the exchanged data in the channel cannot be forged or modified by the adversary. In most existing authentication schemes, the vehicle can only authenticate with a Trusted Authority (TA), which results in the authentication efficiency of these centralized authentication schemes are easily affected by the TA's computa-tional and communication bottlenecks as the increase of traffic density. Therefore, this paper proposes a secure and computationally efficient authentication and key agreement scheme for the IoV, where the RSU can authenticate with the vehicle. Under the analysis of the Real-Or-Random model and the simulation tool ProVerif, the proposed scheme is proved to be secure. Compared with existing schemes, the proposed scheme improves the authentication efficiency and reduces energy consumption.
引用
收藏
页数:14
相关论文
共 25 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
Aman MN, 2017, 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, P310, DOI 10.1109/DESEC.2017.8073853
[3]  
[Anonymous], 2012, P 9 ACM INT WORKSH V
[4]  
Arora A, 2018, P 3 INT C INT THINGS, P267
[5]  
Carman D., 2000, DARPA Project Rep., V1, P1
[6]   A Secure Authentication Protocol for Internet of Vehicles [J].
Chen, Chien-Ming ;
Xiang, Bin ;
Liu, Yining ;
Wang, King-Hang .
IEEE ACCESS, 2019, 7 :12047-12057
[7]   Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles [J].
Cui, Jie ;
Xu, Wenyu ;
Zhong, Hong ;
Zhang, Jing ;
Xu, Yan ;
Liu, Lu .
SENSORS, 2018, 18 (05)
[8]   Secure Message Communication Protocol Among Vehicles in Smart City [J].
Dua, Amit ;
Kumar, Neeraj ;
Das, Ashok Kumar ;
Susilo, Willy .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (05) :4359-4373
[9]   Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Wu, Wei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) :2052-2064
[10]   Toward a secure batch verification with group testing for VANET [J].
Lee, Cheng-Chi ;
Lai, Yan-Ming .
WIRELESS NETWORKS, 2013, 19 (06) :1441-1449