A Quantum-Resistant Key Management Scheme Using Blockchain in C-V2X

被引:1
|
作者
Gong, Yujing [1 ]
Hu, Bin-Jie [1 ]
机构
[1] South China Univ Technol, Sch Elect & Informat Engn, Guangzhou 510640, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchains; Cryptography; Vectors; Lattices; Security; Proposals; Resistance; C-V2X; quantum attack; blockchain; key management; AGREEMENT PROTOCOL; AUTHENTICATION; EFFICIENT;
D O I
10.1109/TITS.2024.3421381
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Cellular-Vehicle-to-Everything (C-V2X) is featured as a heterogenous network, with the support of cellular based uplink/downlink transmissions and sidelink communications as well as network backhauling, where infringement on security can happen. Additionally, the developing quantum attack strikes the original NP-hard problems to be solvable in polynomial time complexity. Therefore, it is fatal to build a secure environment for vehicles to communicate in C-V2X. In this paper, we propose a key management scheme utilizing blockchain deployed at the base station for distributed storage and retrieval of vehicles' public keys. In the network, each vehicle is identified with a public-private key pair, upon which vehicular registration, authenticated key agreement and revocation rely. In particular, the lattice-based cryptography is applied to the distribution of the group key for broadcasting beacon messages and establishing session keys for a secure peer-to-peer (P2P) communication. Keys are updated as vehicles travel from one region to another and are revoked upon misbehavior detection. We analyzed the quantum resistance of our scheme theoretically and its conservation against certain attacks informally. Comparative analysis across computation, communication, storage and energy consumption demonstrates the characteristics of our scheme. Finally, the blockchain simulation demonstrates the scalability of our scheme.
引用
收藏
页码:16831 / 16844
页数:14
相关论文
共 50 条
  • [1] Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITS
    Ha, Sewan
    Lee, Hakjun
    Won, Dongho
    Lee, Youngsook
    PROCEEDINGS OF THE 2020 14TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM), 2020,
  • [2] A Quantum-Resistant Face Template Protection Scheme using Kyber and Saber Public Key Encryption Algorithms
    Roman, Roberto
    Arjona, Rosario
    Lopez-Gonzalez, Paula
    Baturone, Iluminada
    PROCEEDINGS OF THE 21ST 2022 INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG 2022), 2022, P-329
  • [3] Radio Resource Management for C-V2X: From a Hybrid Centralized-Distributed Scheme to a Distributed Scheme
    Guo, Chi
    Wang, Cong
    Cui, Lin
    Zhou, Qiuzhan
    Li, Juan
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2023, 41 (04) : 1023 - 1034
  • [4] C-V2X Equipment Identification Management and Authentication Mechanism
    Chen, Shanzhi
    Li, Qiang
    Wang, Yong
    Xu, Hui
    Jia, Xiaoyong
    CHINA COMMUNICATIONS, 2021, 18 (08) : 297 - 306
  • [5] C-V2X Equipment Identification Management and Authentication Mechanism
    Shanzhi Chen
    Qiang Li
    Yong Wang
    Hui Xu
    Xiaoyong Jia
    中国通信, 2021, 18 (08) : 297 - 306
  • [6] The Feasibility of NOMA in C-V2X
    Situ, Zhenhui
    Ho, Ivan Wang-Hei
    Hou, Yun
    Li, Peiya
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 562 - 567
  • [7] A Critical Assessment of C-V2X Resource Allocation Scheme for Platooning Applications
    Segata, Michele
    Arvani, Piermaria
    Lo Cigno, Renato
    2021 16TH ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES CONFERENCE (WONS), 2021, : 39 - 46
  • [8] A dynamic C-V2X anonymous authentication and group key agreement protocol
    Cui, Beibei
    He, Wei
    Cui, Yan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (04) : 2977 - 2989
  • [9] Channel Estimation in C-V2X using Deep Learning
    Sattiraju, Raja
    Weinand, Andreas
    Schotten, Hans D.
    13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,
  • [10] A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm
    Xia, Tao
    Wang, Menglin
    He, Jun
    Yang, Gang
    Fan, Linna
    Wei, Guoheng
    DRONES, 2024, 8 (08)