An Efficient Lightweight Mutual Authentication and Key Exchange Protocol for Roaming Vehicle

被引:1
|
作者
Yadav, Kirti A. [1 ]
Vijayakumar, P. [1 ]
机构
[1] Vellore Inst Technol, Sch Elect Engn, Chennai 600127, Tamil Nadu, India
关键词
Authentication; computation cost; communication cost; intelligent transport system (ITS); privacy preservation; roaming; signature; trusted authority; vehicular adhoc network; PRIVACY-PRESERVING AUTHENTICATION; SECURE; SERVICES; SCHEME;
D O I
10.1109/ACCESS.2023.3276822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intelligent vehicles and their infrastructure have been a booming topic that requires attention towards grooming security services and providing a safe-secure drive experience to users worldwide. Authentication of these vehicles within and away from the home network plays an essential role in maintaining seamless service access, especially for users moving away from the home network. Traditional schemes are centralized and primarily focus on vehicle authentication within a home network. Very few studies have been conducted on vehicle authentication during roaming. The trusted authority (TA) must authenticate its vehicle along with the one in roaming, which increases the communication and computational load on the TA as scalability increases. This article presents a lightweight authentication scheme, especially for roaming vehicles, and focuses on sharing the authentication load. A vehicle, along with its home TA (HTA) identity, sends an authentication request to a nearby roadside unit (RSU) during roaming. After receiving an authentication request from the RSU, the foreign TA (FTA) connects to the HTA. Vehicle authenticity was confirmed as a session key generated for communication with a roaming vehicle, ensuring seamless service access. The proposed scheme was tested against standard BAN logic to prove that it meets the required security standards and authentication requirements. Furthermore, the communication and computation cost analysis proves that this scheme is lightweight compared with other traditional schemes. Security analysis proves that the proposed scheme can successfully prevent major attacks, such as anonymity, unlinkability, replay attack, message tampering, and malicious vehicle tracking.
引用
收藏
页码:49540 / 49548
页数:9
相关论文
共 50 条
  • [41] A new mutual authentication and key exchange protocol with balanced computational power for wireless settings
    Yang, CC
    Li, JW
    Hwang, MS
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2004, 15 (02): : 91 - 99
  • [42] A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
    Pan, Menghan
    He, Daojing
    Li, Xuru
    Chan, Sammy
    Panaousis, Emmanouil
    Gao, Yun
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [43] An enhanced authentication key exchange protocol
    Hwang, RJ
    Shiau, SH
    Lai, CH
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 202 - 205
  • [44] Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services
    Gope, Prosanta
    Hsu, Ruei-Hau
    Lee, Jemin
    Quek, Tony Q. S.
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 247 - 252
  • [45] Secure and Efficient Anonymous Authentication Protocol for Global Roaming Services
    Roy, Prasanta Kumar
    Bhattacharya, Ansuman
    2019 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2019, : 44 - 49
  • [46] A Secure and Efficient Lightweight Vehicle Group Authentication Protocol in 5G Networks
    Miao, Junfeng
    Wang, Zhaoshun
    Miao, Xue
    Xing, Longyue
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [47] A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment
    Prasanta Kumar Roy
    Ansuman Bhattacharya
    The Journal of Supercomputing, 2022, 78 : 5903 - 5930
  • [48] Efficient remote mutual authentication and key agreement
    Shieh, WG
    Wang, FM
    COMPUTERS & SECURITY, 2006, 25 (01) : 72 - 77
  • [49] Efficient Implementation of RFID Mutual Authentication Protocol
    Huang, Yu-Jung
    Lin, Wei-Cheng
    Li, Hung-Lin
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (12) : 4784 - 4791
  • [50] AN EFFICIENT MUTUAL AUTHENTICATION PROTOCOL FOR RFID SYSTEMS
    Lin, Iuon-Chang
    Wang, Chi-Wei
    Luo, Rui-Kun
    You, Hsin-Chiang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (06): : 3097 - 3106