A Noval and Efficient Three-Party Identity Authentication and Key Negotiation Protocol Based on Elliptic Curve Cryptography in VANETs

被引:1
|
作者
Yu, Wenping [1 ]
Zhang, Rui [1 ]
Ma, Maode [2 ]
Wang, Cong [1 ]
机构
[1] Tianjin Univ Sci & Technol, Coll Artificial Intelligence, Tianjin 300457, Peoples R China
[2] Qatar Univ, Coll Engn, POB 2713, Doha, Qatar
关键词
VANETs; elliptic curve; three-party authentication; key agreement; SCHEME; SECURE; IMPROVEMENT;
D O I
10.3390/electronics13020449
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the process of vehicles transitioning from conventional means of transportation to mobile computing platforms, ensuring secure communication and data exchange is of paramount importance. Consequently, identity authentication has emerged as a crucial security measure. Specifically, effective authentication is required prior to the communication between the On-Board Unit (OBU) and Roadside Unit (RSU). To address vehicle identity authentication challenges in the Internet of Vehicles (VANETs), this paper proposes a three-party identity authentication and key agreement protocol based on elliptic curve public key cryptography. Considering issues such as vehicle impersonation attacks, RSU impersonation attacks, and vehicle privacy breaches in existing schemes within wireless mobile environments, this protocol introduces a trusted registry center that successfully enables mutual authentication between OBU and RSU. The proposed protocol not only enhances the VANETs system's ability to withstand security threats but also improves the credibility and efficiency of the authentication process.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography
    Tan, Zuowen
    Journal of Convergence Information Technology, 2010, 5 (04)
  • [2] Cryptanalysis of a Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography
    Pu, Qiong
    Zhao, Xiuying
    Ding, Jianmin
    2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 7 - 10
  • [3] An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    Yang, Jen-Ho
    Chang, Chin-Chen
    JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (09) : 1497 - 1502
  • [4] Efficient three-party authenticated key agreement protocol in certificateless cryptography
    Xiong, Hu
    Chen, Zhong
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (13) : 2707 - 2716
  • [5] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [6] An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments
    He, Debiao
    Chen, Yitao
    Chen, Jianhua
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08) : 2055 - 2061
  • [7] An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments
    Debiao He
    Yitao Chen
    Jianhua Chen
    Arabian Journal for Science and Engineering, 2013, 38 : 2055 - 2061
  • [8] An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks
    Rajeswari, P. G.
    Thilagavathi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (02): : 176 - 185
  • [9] An Efficient Three-Party Authentication Key Exchange Protocol for Wireless Sensor Networks
    Li, Hongtu
    Hu, Liang
    Chu, Jianfeng
    Chi, Ling
    Li, Hongwei
    SENSOR LETTERS, 2013, 11 (05) : 990 - 996
  • [10] Three-Party Password Authentication and Key Exchange Protocol Based on MLWE
    Guo, Songhui
    Song, Yunfan
    Guo, Song
    Yang, Yeming
    Song, Shuaichao
    SYMMETRY-BASEL, 2023, 15 (09):