A Novel Cloud-Assisted Authentication Key Agreement Protocol for VANET

被引:0
|
作者
Zhou, Yanwei [1 ,2 ]
Cao, Lei [1 ]
Qiao, Zirui [3 ]
Xu, Ran [1 ]
Han, Yu [1 ]
Xing, Junsheng [4 ]
Yang, Bo [1 ]
Xia, Zhe [5 ]
Zhang, Mingwu [6 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710122, Peoples R China
[4] Shaanxi Normal Univ, Sch Int Studies, Xian 710119, Peoples R China
[5] Wuhan Univ Technol, Sch Comp, Wuhan 430062, Peoples R China
[6] Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China
关键词
Authentication; Protocols; Vehicular ad hoc networks; Internet of Things; Cloud computing; Security; Binary trees; Authentication key agreement; cloud storage; fuzzy identity; VANET;
D O I
10.1109/TVT.2024.3390654
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Vehicular Ad hoc Networks (VANET) serve as an emerging technology to provides great promise for building intelligent transportation systems with convenient, enriched, and smart transportation services. Furthermore, VANET provides an intelligent platform that enables vehicles and infrastructures to share relevant information through communication, facilitating vehicle predictions of road conditions and reducing traffic accidents. Therefore, VANET faces intricacies and vulnerabilities to various security threats. Generally, to further achieve secure communication, the authentication key agreement (AKA) protocol is a crucial technology in VANET. However, the existing AKA protocols for Vehicle-to-Vehicle (V2V) communication still have some challenges. Firstly, most protocols can only achieve one-to-one identity authentication, and can not authenticate with multiple users at once, which is inefficient. Secondly, some schemes have one-to-many authentication functions but also have a linearly increasing storage cost, and their complex operations pose an expensive computational burden on resource-constrained devices. To further address these shortcomings, we propose a novel AKA protocol that utilizes the vehicle's attributes as identity, allowing for multiple identity authentication. In the extended Canetti-Krawczyk (eCK) security model, our protocol satisfies the unforgeability of messages and indistinguishability of session keys based on the hardness of the complexity assumptions. Furthermore, we conducted simulations of our protocol using ProVerif, a formal proof tool, which confirms that our protocol satisfies the security properties. To evaluate the performance of our proposal, we analyzed it using JPBC, a cryptographic library based on the Java language, as well as Veins (Omnet++ and Sumo), and the results indicate that our proposal outperforms other schemes and is suitable for deployment in high-traffic, high-density, and resource-constrained VANET scenarios.
引用
收藏
页码:13526 / 13541
页数:16
相关论文
共 50 条
  • [31] Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of Things
    Alshaeri, Abdulaziz
    Younis, Mohamed
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 152 - 158
  • [32] Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain
    Son, Seunghwan
    Lee, Joonyoung
    Kim, Myeonghyun
    Yu, Sungjin
    Das, Ashok Kumar
    Park, Youngho
    IEEE ACCESS, 2020, 8 : 192177 - 192191
  • [33] Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems
    Challa, Sravani
    Das, Ashok Kumar
    Gope, Prosanta
    Kumar, Neeraj
    Wu, Fan
    Vasilakos, Athanasios V.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 1267 - 1286
  • [34] A cocktail protocol with the Authentication and Key Agreement on the UMTS
    Ou, Hsia-Hung
    Hwang, Min-Shiang
    Jan, Jinn-Ke
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (02) : 316 - 325
  • [35] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754
  • [36] Improved Adaptive Protocol for Authentication and Key Agreement
    Shalmany, Nasibeh Alijanpour
    Rahbar, Akbar Ghaffar Pour
    2008 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, : 1 - 6
  • [37] An authentication and key agreement protocol for satellite communications
    Chang, Chin-Chen
    Cheng, Ting-Fang
    Wu, Hsiao-Ling
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1994 - 2006
  • [38] A Lightweight Key Agreement Protocol with Authentication Capability
    Guan, Albert
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021, 32 (04) : 389 - 404
  • [39] IRONWOOD META KEY AGREEMENT AND AUTHENTICATION PROTOCOL
    Anshel, Iris
    Atkins, Derek
    Goldfeld, Dorian
    Gunnells, Paul E.
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2021, 15 (03) : 397 - 413
  • [40] Improved quantum key agreement protocol with authentication
    郭继红
    柏明强
    雷小燕
    谢佳欣
    莫智文
    ChinesePhysicsB, 2023, 32 (05) : 356 - 361