Three-factor authentication and key agreement protocol with collusion resistance in VANETs

被引:0
|
作者
Pan, Guanlin [1 ]
Tan, Haowen [2 ,3 ,4 ,5 ,6 ]
Zheng, Wenying [7 ]
Vijayakumar, P. [8 ]
Wu, Q. M. Jonathan [9 ]
Sivaraman, Audithan [10 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp Sci, Nanjing 214111, Jiangsu, Peoples R China
[2] Zhejiang Univ, Sch Cyber Sci & Technol, Hangzhou 310018, Peoples R China
[3] Zhejiang Sci Tech Univ, Zhejiang Prov Key Lab Digital Fash & Data Governan, Hangzhou 310018, Zhejiang, Peoples R China
[4] Zhejiang Sci Tech Univ, Zhejiang Prov Int Cooperat Base Sci & Technol Clou, Hangzhou 310018, Zhejiang, Peoples R China
[5] Zhejiang Prov Innovat Ctr Adv Text Technol, Shaoxing 312000, Zhejiang, Peoples R China
[6] Guangzhou Univ, Guangdong Key Lab Blockchain Secur, Guangzhou 510006, Guangdong, Peoples R China
[7] Zhejiang Sci Tech Univ, Sch Comp Sci & Technol, Hangzhou 310018, Zhejiang, Peoples R China
[8] JJ Coll Engn & Technol, Dept Informat Technol, Tiruchirappalli 620009, Tamil Nadu, India
[9] Univ Windsor, Dept Elect & Comp Engn, Windsor SL4 3BB, ON, Canada
[10] Madan Mohan Malaviya Univ Technol, Gorakhpur 273010, India
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Three-factor authentication; Access control for multiple-vehicle; Aggregate signature; Collusion attack; VANETs; CERTIFICATELESS AGGREGATE SIGNATURE; ATTRIBUTE-BASED SIGNATURE; INDUSTRIAL-INTERNET; SCHEME;
D O I
10.1016/j.jisa.2025.104029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In vehicular ad hoc networks (VANETs), vehicles possess the capability to interact efficiently with a diverse array of services and applications provided by edge vehicular infrastructures. Concurrently, the ongoing interactions among vehicles facilitate the real-time acquisition of crucial road information. However, these vehicular communications primarily occur over unsecured public channels, rendering confidential data susceptible to illegal access by malicious entities. To address this security concern, numerous cryptographic schemes, including the widespread adoption of multi-factor authentication techniques, have been introduced. Despite these efforts, the existing authentication methods are limited, as they solely focus on verifying the legitimacy of individual users, resulting in restricted functionality and diminished security capabilities. So, three-factor authentication and key agreement protocol with collusion resistance in VANETs (TFA-CR) in this paper is developed, which also ensures resistance against collusion attacks. In the proposed design, we leverage hybrid characteristics that encompass both vehicle and user attributes, such as user identity, user-defined parameters, and vehicular verification codes. These attributes are efficiently extracted and utilized throughout the subsequent authentication process, creating a distinctive authentication mechanism tailored for real-world multi-vehicle scenarios. This enables seamless network access for individual users across different vehicles using only a single smart card. A thorough performance evaluation reveals that the protocol effectively reduces both communication overhead and computational complexity when compared to existing authentication techniques.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] A secure three-factor authentication protocol for mobile networks
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [32] An Unlinkable Authenticated Key Agreement With Collusion Resistant for VANETs
    Li, Xinghua
    Liu, Jiao
    Obaidat, Mohammad S.
    Vijayakumar, P.
    Jiang, Qi
    Amin, Ruhul
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (08) : 7992 - 8006
  • [33] A secure and efficient authentication and key agreement protocol in blockchain-enabled VANETs
    Shahparian, J.
    Erfani, S. H.
    Zamanifar, A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 122
  • [34] An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
    Challa, Sravani
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Kumari, Saru
    Khan, Muhammad Khurram
    Vasilakos, Athanasios V.
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 534 - 554
  • [35] Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement
    Zhang, Liping
    Zhang, Yixin
    Tang, Shanyu
    Luo, He
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (03) : 2795 - 2805
  • [36] An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey
    Chuang, Yun-Hsin
    Lei, Chin-Laung
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (01)
  • [37] A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
    Sammoud, Amal
    Chalouf, Mohamed Aymen
    Hamdi, Omessaad
    Montavont, Nicolas
    Bouallegue, Ammar
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1916 - 1921
  • [38] Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices
    Wang, Zhenyu
    Deng, Ding
    Hou, Shen
    Guo, Yang
    Li, Shaoqing
    COMPUTER COMMUNICATIONS, 2023, 203 : 1 - 14
  • [39] Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things
    Xu, Hang
    Hsu, Chingfang
    Harn, Lein
    Cui, Janqun
    Zhao, Zhuo
    Zhang, Ze
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 3000 - 3013
  • [40] Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
    Park, YoHan
    Park, YoungHo
    SENSORS, 2016, 16 (12)