A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network

被引:0
|
作者
Xu, Peng [1 ,3 ]
Wang, Xiuzhen [1 ,3 ]
Chen, Meirong [1 ,2 ]
机构
[1] Natl Local Joint Engn Lab Syst Credibil Automat Ve, Chengdu 611756, Peoples R China
[2] Chengdu Text Coll, Chengdu 611731, Peoples R China
[3] Southwest Jiaotong Univ, Sch Math, Chengdu 611756, Peoples R China
关键词
Internet of vehicles; Authentication and key exchange protocol; Insecure channel; Formal verification; Real-or-random model; MUTUAL AUTHENTICATION; INTERNET; SCHEME;
D O I
10.1007/s44196-025-00754-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Vehicles technology has been widely applied in various communication scenarios, including vehicles to vehicles, vehicles to roadside facilities, vehicles to pedestrians, and vehicles to cloud. Owing to transmitting data through public channels, various security issues like identity leakage, man in the middle attack, key leakage and etc., are also introduced simultaneously and still challenging to be solved. Researches and practices have shown that authentication and key exchange protocols are effective methods to solve such security issues. However, most existing security protocols for Internet of Vehicles are established on the premise that the registration process is with a secure channel, which is usually not satisfied and deviates from practical applications. Accordingly, an authentication and key exchange protocol with an insecure channel has been proposed, in which the operations of symmetric encryption and XOR encryption are adopted for all interactive processes to improve protocol security. The theoretical analysis and formal verification demonstrate that the proposed protocol satisfies security properties including authentication and confidentiality, and reduces the costs of computation and communication compared with the method with public key encryption.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] FULL SECURE KEY EXCHANGE AND AUTHENTICATION WITH NO PREVIOUSLY SHARED SECRETS
    FERRER, JDI
    ROTGER, LHI
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 665 - 670
  • [42] Image based Authentication with Secure Key Exchange Mechanism in Cloud
    Tomar, Anurag Singh
    Tak, Gaurav Kumar
    Chaudhary, Ruchi
    2014 INTERNATIONAL CONFERENCE ON MEDICAL IMAGING, M-HEALTH & EMERGING COMMUNICATION SYSTEMS (MEDCOM), 2015, : 428 - 431
  • [43] A new Authentication and Key Exchange Protocol for Insecure Networks
    Fereidooni, H.
    Taheri, H.
    Mahramian, M.
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4541 - +
  • [44] A Secure Two-Factor Authentication Key Exchange Scheme
    Han, Yunxia
    Xu, Chunxiang
    Jiang, Changsong
    Chen, Kefei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5681 - 5693
  • [45] BioSAKE: Biometrics-based Secure Authentication and Key Exchange
    Nandakumar, Karthik
    2013 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2013,
  • [46] A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT
    He, Daojing
    Cai, Yanchang
    Zhu, Shanshan
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (11) : 7862 - 7872
  • [47] An Intrusion-tolerant Secure Routing Protocol with Key Exchange for Wireless Sensor Network
    Zhou, Jiliang
    Li, Caixia
    Cao, Qiying
    Shen, Yu
    2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 1547 - 1552
  • [48] A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles
    Xu, Zisang
    Li, Xiong
    Xu, Jianbo
    Liang, Wei
    Choo, Kim-Kwang Raymond
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 95
  • [49] Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
    Nyangaresi, Vincent Omollo
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (04):
  • [50] Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key
    Kim, Mijin
    Jo, Heasuk
    Kim, Seungjoo
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 : 204 - 211