A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles

被引:41
|
作者
Xu, Zisang [1 ]
Li, Xiong [2 ]
Xu, Jianbo [3 ]
Liang, Wei [4 ]
Choo, Kim-Kwang Raymond [5 ]
机构
[1] Changsha Univ Sci & Technol, Comp & Commun Engineer Inst, Changsha 410114, Hunan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Inst Cyber Secur, Chengdu 611731, Peoples R China
[3] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Hunan, Peoples R China
[4] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Internet of Vehicles; Authentication; Key agreement; Security; PROTOCOL;
D O I
10.1016/j.compeleceng.2021.107409
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet of Vehicles (IoV), the communication between vehicles and RoadSide Units (RSUs) usually through wireless channels. Therefore, the IoV requires a reliable and secure authentication and key agreement scheme to ensure that the exchanged data in the channel cannot be forged or modified by the adversary. In most existing authentication schemes, the vehicle can only authenticate with a Trusted Authority (TA), which results in the authentication efficiency of these centralized authentication schemes are easily affected by the TA's computa-tional and communication bottlenecks as the increase of traffic density. Therefore, this paper proposes a secure and computationally efficient authentication and key agreement scheme for the IoV, where the RSU can authenticate with the vehicle. Under the analysis of the Real-Or-Random model and the simulation tool ProVerif, the proposed scheme is proved to be secure. Compared with existing schemes, the proposed scheme improves the authentication efficiency and reduces energy consumption.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Provably Secure Authentication Scheme for Fog Computing-Enabled Intelligent Social Internet of Vehicles
    Chen, Chien-Ming
    Li, Zhen
    Das, Ashok Kumar
    Chaudhry, Shehzad Ashraf
    Lorenz, Pascal
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (09) : 13600 - 13610
  • [42] A Critique of a Lightweight Authentication and Key Agreement Scheme for Internet of Drones
    Chang, Ya-Fen
    Huang, Sheng-Jie
    Chen, Guan-Xi
    Tai, Wei-Liang
    2021 INTERNATIONAL CONFERENCE ON SECURITY AND INFORMATION TECHNOLOGIES WITH AI, INTERNET COMPUTING AND BIG-DATA APPLICATIONS, 2023, 314 : 337 - 346
  • [43] Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (01)
  • [44] SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks
    Zhang, Jing
    Zhong, Hong
    Cui, Jie
    Xu, Yan
    Liu, Lu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1810 - 1824
  • [45] Computationally efficient and secure anonymous authentication scheme for cloud users
    Arasan A.
    Sadaiyandi R.
    Al-Turjman F.
    Rajasekaran A.S.
    Selvi Karuppuswamy K.
    Personal and Ubiquitous Computing, 2024, 28 (1) : 111 - 121
  • [46] A lightweight authentication and key agreement scheme for Internet of Drones
    Zhang, Yunru
    He, Debiao
    Li, Li
    Chen, Biwen
    COMPUTER COMMUNICATIONS, 2020, 154 : 455 - 464
  • [47] Secure and Efficient Authentication and Key Agreement Scheme for Multicast Services in 5G Vehicular to Everything
    Zhang, Yinghui
    Li, Guoteng
    Han, Gang
    Cao, Jin
    Zheng, Dong
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (07): : 3026 - 3035
  • [48] An Efficient Anonymous Authentication Scheme for Internet of Vehicles
    Liu, Jingwei
    Li, Qingqing
    Sun, Rong
    Du, Xiaojiang
    Guizani, Mohsen
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [49] An efficient nonce-based authentication scheme with key agreement
    Chen, YC
    Yeh, LY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 982 - 994
  • [50] Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments
    Park, Yohan
    Ryu, Daeun
    Kwon, Deokkyu
    Park, Youngho
    SENSORS, 2023, 23 (04)