A Secure Authentication Protocol for Internet of Vehicles

被引:270
作者
Chen, Chien-Ming [1 ]
Xiang, Bin [2 ]
Liu, Yining [3 ]
Wang, King-Hang [4 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Shandong, Peoples R China
[2] Harbin Inst Technol Shenzhen, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[3] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
[4] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Vehicles; authentication; anonymity; smart card; LIGHTWEIGHT AUTHENTICATION; BATCH VERIFICATION; ROAMING SERVICE; SCHEME; EFFICIENT;
D O I
10.1109/ACCESS.2019.2891105
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An Internet of Vehicles (IoV) allows forming a self-organized network and broadcasting messages for the vehicles on roads. However, as the data are transmitted in an insecure network, it is essential to use an authentication mechanism to protect the privacy of vehicle users. Recently, Ying et al. proposed an authentication protocol for IoV and claimed that the protocol could resist various attacks. Unfortunately, we discovered that their protocol suffered from an offline identity guessing attack, location spoofing attack, and replay attack, and consumed a considerable amount of time for authentication. To resolve these shortcomings, we propose an improved protocol. In addition, we provide a formal proof to the proposed protocol to demonstrate that our protocol is indeed secure. Compared with previous methods, the proposed protocol performs better in terms of security and performance.
引用
收藏
页码:12047 / 12057
页数:11
相关论文
共 28 条
[1]  
[Anonymous], INT J NETW SECUR
[2]  
[Anonymous], P IEEE 79 VEH TECHN
[3]  
[Anonymous], 2005, Challenges in securing vehicular networks
[4]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[5]  
Bernstein D., 2010, Proceedings of the Fifth International Conference on Systems and Networks Communications (ICSNC 2010), P117, DOI 10.1109/ICSNC.2010.24
[6]  
Capkun S, 2005, IEEE INFOCOM SER, P1917
[7]   A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol [J].
Chen, Chien-Ming ;
Xiang, Bin ;
Wang, King-Hang ;
Yeh, Kuo-Hui ;
Wu, Tsu-Yang .
APPLIED SCIENCES-BASEL, 2018, 8 (10)
[8]  
Eltoweissy M., 2010, AD HOC NETW, P1, DOI DOI 10.1007/978-3-642-17994-5_1
[9]   An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks [J].
He, Debiao ;
Zeadally, Sherali ;
Xu, Baowen ;
Huang, Xinyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) :2681-2691
[10]  
Hussain R., 2012, 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom). Proceedings, P606, DOI 10.1109/CloudCom.2012.6427481