Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs

被引:43
作者
Wei, Lu [1 ,2 ,3 ]
Cui, Jie [1 ,2 ,3 ]
Zhong, Hong [1 ,2 ,3 ]
Xu, Yan [1 ,2 ,3 ]
Liu, Lu [4 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Minist Educ, Key Lab Intelligent Comp & Signal Proc, Hefei 230601, Peoples R China
[2] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Peoples R China
[3] Anhui Univ, Inst Phys Sci & Informat Technol, Hefei 230601, Peoples R China
[4] Univ Leicester, Sch Informat, Leicester LE1 7RH, Leics, England
基金
中国国家自然科学基金;
关键词
Authentication; Protocols; Elliptic curve cryptography; Public key; Privacy; Vehicle-to-infrastructure; Encryption; VANETs; security; authenticated key agreement; vehicle-to-vehicle; vehicle-to-infrastructure; three-party authentication; key updating; PROVABLY-SECURE; EFFICIENT; SCHEME; PROTOCOL; MANAGEMENT; EXCHANGE;
D O I
10.1109/TMC.2021.3056712
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks (VANETs) are vulnerable to many kinds of security attacks, so it is necessary to design an authenticated key agreement (AKA) scheme for securing communication channels in VANETs. Existing AKA schemes in VANETs have not provided an efficient and secure method to secure V2V and V2I communications simultaneously while meeting the necessary security and privacy requirements. Further, few key updating mechanisms, which are secure, conditional privacy-preserving, practical, and lightweight, exist in current VANETs AKA schemes. In this paper, we propose a proven secure AKA scheme for securing V2V and V2I communications in VANETs, which can be divided into two parts. The first part is a three-party authentication process in which vehicles, road side unit (RSU), and trust authority (TA) authenticate each other. The second part is the key agreement process, which is used in the key generation and updating processes. For this phase, we design a tree-based key agreement algorithm that considers two scenarios, i.e., the joining of an authenticated vehicle and the leaving of the vehicle. The formal security proof and the security analysis show that our proposed scheme satisfies session key security and the necessary security requirements in VANETs, respectively. The performance analysis demonstrates that our proposed scheme has an advantage over several representative AKA schemes in VANETs.
引用
收藏
页码:3280 / 3297
页数:18
相关论文
共 57 条
  • [1] 3rd Generation Partnership Program (3GPP), 2017, TECH REP TS 33185 V1
  • [2] 3rd Generation Partnership Program (3GPP), 2017, TECH REP TS 22185 V1
  • [3] 3rd Generation Partnership Program (3GPP), 2018, TECH REP TS 33501 V1
  • [4] [Anonymous], Simulation of Urban Mobility
  • [5] A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    Majidi, Akbar
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) : 5409 - 5423
  • [6] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [7] Short group signatures
    Boneh, D
    Boyen, X
    Shacham, H
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 41 - 55
  • [8] Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
  • [9] Chaum D., 1991, Advances in Cryptology - EUROCRYPT '91. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P257
  • [10] SPECS: Secure and privacy enhancing communications schemes for VANETs
    Chim, T. W.
    Yiu, S. M.
    Hui, Lucas C. K.
    Li, Victor O. K.
    [J]. AD HOC NETWORKS, 2011, 9 (02) : 189 - 203