A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network

被引:0
|
作者
Xu, Peng [1 ,3 ]
Wang, Xiuzhen [1 ,3 ]
Chen, Meirong [1 ,2 ]
机构
[1] Natl Local Joint Engn Lab Syst Credibil Automat Ve, Chengdu 611756, Peoples R China
[2] Chengdu Text Coll, Chengdu 611731, Peoples R China
[3] Southwest Jiaotong Univ, Sch Math, Chengdu 611756, Peoples R China
关键词
Internet of vehicles; Authentication and key exchange protocol; Insecure channel; Formal verification; Real-or-random model; MUTUAL AUTHENTICATION; INTERNET; SCHEME;
D O I
10.1007/s44196-025-00754-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Vehicles technology has been widely applied in various communication scenarios, including vehicles to vehicles, vehicles to roadside facilities, vehicles to pedestrians, and vehicles to cloud. Owing to transmitting data through public channels, various security issues like identity leakage, man in the middle attack, key leakage and etc., are also introduced simultaneously and still challenging to be solved. Researches and practices have shown that authentication and key exchange protocols are effective methods to solve such security issues. However, most existing security protocols for Internet of Vehicles are established on the premise that the registration process is with a secure channel, which is usually not satisfied and deviates from practical applications. Accordingly, an authentication and key exchange protocol with an insecure channel has been proposed, in which the operations of symmetric encryption and XOR encryption are adopted for all interactive processes to improve protocol security. The theoretical analysis and formal verification demonstrate that the proposed protocol satisfies security properties including authentication and confidentiality, and reduces the costs of computation and communication compared with the method with public key encryption.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] A Permanent Secure QKD Protocol Realized with Asymmetric Key Authentication
    Yin, Heyu
    Xu, Qiuliang
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 457 - 460
  • [32] A receiver authentication and group key delivery protocol for secure multicast
    Ueno, H
    Suzuki, H
    Ishikawa, N
    Takahashi, O
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 1139 - 1148
  • [33] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Alizadeh, Javad
    Safkhani, Masoumeh
    Allahdadi, Amir
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (04) : 2911 - 2935
  • [34] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Javad Alizadeh
    Masoumeh Safkhani
    Amir Allahdadi
    Wireless Personal Communications, 2022, 126 : 2911 - 2935
  • [35] SAKA: a secure authentication and key agreement protocol for GSM networks
    Neetesh Saxena
    Narendra S. Chaudhari
    CSI Transactions on ICT, 2013, 1 (4) : 331 - 341
  • [36] Key Management and Authentication Protocol for UAV Network
    Zhu H.
    Zhang Y.
    Yu P.
    Zhang Z.
    Wu H.
    Zhao H.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2019, 51 (03): : 158 - 166
  • [37] A Secure and Efficient Authentication Protocol in Wireless Sensor Network
    Kakali Chatterjee
    Asok De
    Daya Gupta
    Wireless Personal Communications, 2015, 81 : 17 - 37
  • [38] A Secure and Efficient Authentication Protocol in Wireless Sensor Network
    Chatterjee, Kakali
    De, Asok
    Gupta, Daya
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (01) : 17 - 37
  • [39] Efficient and Secure Whole-Network Authentication Protocol
    Wang, Zhiwei
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (07) : 10478 - 10486
  • [40] An anonymous authentication and key exchange protocol in smart grid
    Luo, Yi
    Zheng, Wei-Min
    Chen, Yeh-Cheng
    Journal of Network Intelligence, 2021, 6 (02): : 206 - 215