A Quantum-Resistant Key Management Scheme Using Blockchain in C-V2X

被引:1
|
作者
Gong, Yujing [1 ]
Hu, Bin-Jie [1 ]
机构
[1] South China Univ Technol, Sch Elect & Informat Engn, Guangzhou 510640, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchains; Cryptography; Vectors; Lattices; Security; Proposals; Resistance; C-V2X; quantum attack; blockchain; key management; AGREEMENT PROTOCOL; AUTHENTICATION; EFFICIENT;
D O I
10.1109/TITS.2024.3421381
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Cellular-Vehicle-to-Everything (C-V2X) is featured as a heterogenous network, with the support of cellular based uplink/downlink transmissions and sidelink communications as well as network backhauling, where infringement on security can happen. Additionally, the developing quantum attack strikes the original NP-hard problems to be solvable in polynomial time complexity. Therefore, it is fatal to build a secure environment for vehicles to communicate in C-V2X. In this paper, we propose a key management scheme utilizing blockchain deployed at the base station for distributed storage and retrieval of vehicles' public keys. In the network, each vehicle is identified with a public-private key pair, upon which vehicular registration, authenticated key agreement and revocation rely. In particular, the lattice-based cryptography is applied to the distribution of the group key for broadcasting beacon messages and establishing session keys for a secure peer-to-peer (P2P) communication. Keys are updated as vehicles travel from one region to another and are revoked upon misbehavior detection. We analyzed the quantum resistance of our scheme theoretically and its conservation against certain attacks informally. Comparative analysis across computation, communication, storage and energy consumption demonstrates the characteristics of our scheme. Finally, the blockchain simulation demonstrates the scalability of our scheme.
引用
收藏
页码:16831 / 16844
页数:14
相关论文
共 50 条
  • [21] IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search
    Fan, Qing
    Luo, Min
    Peng, Cong
    Wang, Lianhai
    He, Debiao
    Cui, Jie
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [22] A cluster-based cooperative computation offloading scheme for C-V2X networks
    Bute, Muhammad Saleh
    Fan, Pingzhi
    Liu, Gang
    Abbas, Fakhar
    Ding, Zhiguo
    AD HOC NETWORKS, 2022, 132
  • [23] Overcoming C-V2X Compliance Challenges
    McGrath, Dylan
    MICROWAVE JOURNAL, 2022, 65 (11) : 86 - 96
  • [24] Cooperative Validation of CAM Position Information Using C-V2X
    Eckermann, Fabian
    Gorczak, Philipp
    Wietfeld, Christian
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [25] Secure mmWave C-V2X Communications Using Cooperative Jamming
    Yang, Mingjie
    Ju, Ying
    Liu, Lei
    Pei, Qingqi
    Yu, Keping
    Rodrigues, Joel J. P. C.
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2686 - 2691
  • [26] Quantum-resistant ring signature-based authentication scheme against secret key exposure for VANETs
    Yu, Xiaoling
    Wang, Yuntao
    Huang, Xin
    COMPUTER NETWORKS, 2025, 262
  • [27] Performance Analysis of C-V2X Mode 4 Communication Introducing an Open-Source C-V2X Simulator
    Eckermann, Fabian
    Kahlert, Moritz
    Wietfeld, Christian
    2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL), 2019,
  • [28] C-V2X Assisted mmWave V2V Scheduling
    Molina-Galan, Alejandro
    Coll-Perales, Baldomero
    Gozalvez, Javier
    2019 IEEE 2ND CONNECTED AND AUTOMATED VEHICLES SYMPOSIUM (CAVS), 2019,
  • [29] Radio Resource Management for C-V2X Using Graph Matching and Actor-Critic Learning
    Zhou, Qiuzhan
    Guo, Chi
    Wang, Cong
    Cui, Lin
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (12) : 2645 - 2649
  • [30] A C-V2X Compatible Massive Data Download Scheme Based on Heterogeneous Vehicular Network
    Yin, Xiuwen
    Liu, Jianqi
    Cheng, Xiaochun
    Xiong, Xiaoming
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2023, 69 (04) : 962 - 973