Security Key Management Protocol for Cross-domain Authentication of Internet of Vehicles

被引:0
|
作者
Cui, Meili [1 ]
Ning, Zhenhu [1 ]
Gao, Junchen [1 ]
Peng, Jin [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing, Peoples R China
关键词
Internet of Vehicles; certification protocol; credibility assessment; PRIVACY-PRESERVING AUTHENTICATION; AGREEMENT SCHEME;
D O I
10.1109/ICICSE61805.2024.10625679
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Vehicles is a multi-trust domain autonomous network designed to provide real-time and reliable message services for vehicles, including road conditions, path planning, etc. However, due to factors such as the rapid movement of vehicle nodes, frequent network access, and uneven distribution of vehicle nodes, rapid cross-domain message authentication has become an important challenge. In order to enhance the security of cross-domain authentication in the Internet of Vehicles, this paper proposes a secure authentication key management protocol. In this protocol, the current domain's edge server comprehensively evaluates the vehicle by combining the real-time information of the vehicle and the information of the domains it has passed before. Once the assessment is qualified, the vehicle, with the assistance of TA, completes the establishment of session keys to achieve secure communication. This article uses BAN logic to formally prove the security of the protocol and analyzes its performance through network simulation tools. Experimental results demonstrate that the proposed scheme significantly improves security and performs well in terms of network performance.
引用
收藏
页码:126 / 130
页数:5
相关论文
共 50 条
  • [31] Two-stage authentication and key agreement protocol for commuting in Internet of vehicles
    Zhang, Haibo
    Yu, Yi
    Wang, Dongyu
    He, Xiaofan
    Tongxin Xuebao/Journal on Communications, 2024, 45 (05): : 128 - 139
  • [32] Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECC
    Cao, Liling
    Liang, Mei
    Zhang, Zheng
    Cao, Shouqi
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [33] A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain
    Wang, Xiangyang
    Gu, Chunxiang
    Wei, Fushan
    Lu, Siqi
    Li, Zhaoxuan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [34] Cross-Domain Identity Authentication Protocol of Consortium Blockchain Based on Face Recognition
    Chen, Xiang
    Xu, Shouzhi
    Ma, Kai
    Chen, Peng
    INFORMATION, 2022, 13 (11)
  • [35] A Cross-Domain Authentication Protocol by Identity-Based Cryptography on Consortium Blockchain
    Wei S.-J.
    Li S.-S.
    Wang J.-H.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 908 - 920
  • [36] A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application
    Zhang Qikun
    Gan Yong
    Zhang Quanxin
    Wang Ruifang
    Tan Yu-An
    IEEE ACCESS, 2018, 6 : 24064 - 24074
  • [37] Cross-domain trust management mechanism for internet of things systems
    Xu Wu
    Peer-to-Peer Networking and Applications, 2021, 14 : 933 - 947
  • [38] Cross-domain trust management mechanism for internet of things systems
    Wu, Xu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (02) : 933 - 947
  • [39] A Novel Contributory Cross-domain Group Password-based Authenticated Key Exchange Protocol with Adaptive Security
    Zhu, Liehuang
    Guo, Cong
    Zhang, Zijian
    Fu, Wei
    Xu, Rixin
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 213 - 222
  • [40] A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication
    Qi, Hui
    Li, Peipei
    Wang, Chunbo
    Du, Jinlei
    Di, Xiaoqiang
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (02): : 473 - 485