Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles

被引:234
作者
Jiang, Qi [1 ]
Zhang, Ning [2 ]
Ni, Jianbing [3 ]
Ma, Jianfeng [1 ]
Ma, Xindi [1 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Texas A&M Univ, Corpus Christi, TX 78412 USA
[3] Queens Univ, Dept Elect & Comp Engn, Kingston, ON, Canada
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Protocols; Biometrics (access control); Authentication; Cloud computing; Autonomous vehicles; Privacy; cloud computing; three-factor authentication; key agreement; biometrics; USER AUTHENTICATION; SECURITY; SCHEME; PROTECTION;
D O I
10.1109/TVT.2020.2971254
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Autonomous vehicles (AVs) are increasingly common, although there remain a number of limitations that need to be addressed in order for their deployment to be more widespread. For example, to mitigate the failure of self-driving functions in AVs, introducing the remote control capability (which allows a human driver to operate the vehicle remotely in certain circumferences) is one of several countermeasures proposed. However, the remote control capability breaks the isolation of onboard driving systems and can be potentially exploited by malicious actors to take over control of the AVs; thus, risking the safety of the passengers and pedestrians (e.g., AVs are remotely taken over by terrorist groups to carry out coordinated attacks in places of mass gatherings). Therefore, security is a key, mandatory feature in the design of AVs. In this paper, we propose a cloud-centric three-factor authentication and key agreement protocol (CT-AKA) integrating passwords, biometrics and smart cards to ensure secure access to both cloud and AVs. Three typical biometric encryption approaches, including fuzzy vault, fuzzy commitment, and fuzzy extractor, are unified to achieve three-factor authentication without leaking the biometric privacy of users. Moreover, two session keys are negotiated in our protocol, namely: one between the user and AV to support secure remote control of the AV, and the other is negotiated between the mobile device and the cloud to introduce resilience to the compromise of ephemeral security parameters to ensure cloud data access security with a high security guarantee. Finally, we formally verify the security properties and evaluate the efficiency of CT-AKA, whose findings demonstrate that the protocol achieves high security strength with reasonable computation and communication costs.
引用
收藏
页码:9390 / 9401
页数:12
相关论文
共 61 条
[1]   Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving [J].
Amoozadeh, Mani ;
Raghuramu, Arun ;
Chuah, Chen-Nee ;
Ghosal, Dipak ;
Zhang, H. Michael ;
Rowe, Jeff ;
Levitt, Karl .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :126-132
[2]  
[Anonymous], 2019, AUTONOMOUS VEHICLES
[3]  
[Anonymous], 2018, Autonomous Vehicles: The Race is On
[4]  
Bécsi T, 2015, 2015 INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), P477, DOI 10.1109/MTITS.2015.7223297
[5]   Privacy preserving multi-factor authentication with biometrics [J].
Bhargav-Spantzel, Abhilasha ;
Squicciarini, Anna ;
Modi, Shimon ;
Young, Matthew ;
Bertino, Elisa ;
Elliott, Stephen .
JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) :529-560
[6]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96
[7]   Provably secure user authentication and key agreement scheme for wireless sensor networks [J].
Das, Ashok Kumar ;
Kumari, Saru ;
Odelu, Vanga ;
Li, Xiong ;
Wu, Fan ;
Huang, Xinyi .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) :3670-3687
[8]   Driverless vehicle security: Challenges and future research opportunities [J].
De La Torre, Gonzalo ;
Rad, Paul ;
Choo, Kim-Kwang Raymond .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :1092-1111
[9]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[10]  
dos Santos E, 2016, IEEE VEHIC NETW CONF