An Efficient Lightweight Mutual Authentication and Key Exchange Protocol for Roaming Vehicle

被引:1
|
作者
Yadav, Kirti A. [1 ]
Vijayakumar, P. [1 ]
机构
[1] Vellore Inst Technol, Sch Elect Engn, Chennai 600127, Tamil Nadu, India
关键词
Authentication; computation cost; communication cost; intelligent transport system (ITS); privacy preservation; roaming; signature; trusted authority; vehicular adhoc network; PRIVACY-PRESERVING AUTHENTICATION; SECURE; SERVICES; SCHEME;
D O I
10.1109/ACCESS.2023.3276822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intelligent vehicles and their infrastructure have been a booming topic that requires attention towards grooming security services and providing a safe-secure drive experience to users worldwide. Authentication of these vehicles within and away from the home network plays an essential role in maintaining seamless service access, especially for users moving away from the home network. Traditional schemes are centralized and primarily focus on vehicle authentication within a home network. Very few studies have been conducted on vehicle authentication during roaming. The trusted authority (TA) must authenticate its vehicle along with the one in roaming, which increases the communication and computational load on the TA as scalability increases. This article presents a lightweight authentication scheme, especially for roaming vehicles, and focuses on sharing the authentication load. A vehicle, along with its home TA (HTA) identity, sends an authentication request to a nearby roadside unit (RSU) during roaming. After receiving an authentication request from the RSU, the foreign TA (FTA) connects to the HTA. Vehicle authenticity was confirmed as a session key generated for communication with a roaming vehicle, ensuring seamless service access. The proposed scheme was tested against standard BAN logic to prove that it meets the required security standards and authentication requirements. Furthermore, the communication and computation cost analysis proves that this scheme is lightweight compared with other traditional schemes. Security analysis proves that the proposed scheme can successfully prevent major attacks, such as anonymity, unlinkability, replay attack, message tampering, and malicious vehicle tracking.
引用
收藏
页码:49540 / 49548
页数:9
相关论文
共 50 条
  • [31] An efficient protocol for mutual authentication and key agreement using the subscriber identity module
    Lee, MK
    Hong, DW
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 408 - 413
  • [32] A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks
    Wang, Shaoqiang
    Fan, Ziyao
    Su, Yu
    Zheng, Baosen
    Liu, Zhaoyuan
    Dai, Yinfei
    ELECTRONICS, 2024, 13 (08)
  • [33] A Secure Lightweight Protocol for SMS Mutual Authentication Protocols Based on Symmetic-Key Encryption
    Thammarat, Chalee
    Kurutach, Werasak
    Phoomvuthisam, Suronapee
    2017 17TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2017,
  • [34] A lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment
    Kamil, Ismaila Adeniyi
    Ogundoyin, Sunday Oyinlola
    COMPUTER COMMUNICATIONS, 2021, 170 : 1 - 18
  • [35] A Lightweight Key Agreement Protocol with Authentication Capability
    Guan, Albert
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021, 32 (04) : 389 - 404
  • [36] A lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment
    Kamil, Ismaila Adeniyi
    Ogundoyin, Sunday Oyinlola
    Computer Communications, 2021, 170 : 1 - 18
  • [37] A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment
    Pu, Cong
    Wall, Andrew
    Choo, Kim-Kwang Raymond
    Ahmed, Imtiaz
    Lim, Sunho
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 9918 - 9933
  • [38] Password based key exchange with mutual authentication
    Jiang, SQ
    Gong, G
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 267 - 279
  • [39] An efficient authentication and key-exchange protocol for low power clients
    Dabholkar, A
    Yow, KC
    Mobile and Wireless Communications Networks, 2003, : 270 - 273
  • [40] PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT
    Roy, Sourav
    Das, Dipnarayan
    Mondal, Anindan
    Mahalat, Mahabub Hasan
    Sen, Bibhash
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) : 8547 - 8559