A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs

被引:31
|
作者
Wei, Lu [1 ,2 ,3 ]
Cui, Jie [1 ,2 ,3 ]
Zhong, Hong [1 ,2 ,3 ]
Bolodurina, Irina [4 ]
Liu, Lu [5 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Key Lab Intelligent Comp & Signal Proc, Minist Educ, Hefei 230601, Anhui, Peoples R China
[2] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Anhui, Peoples R China
[3] Anhui Univ, Inst Phys Sci & Informat Technol, Hefei 230601, Anhui, Peoples R China
[4] Orenburg State Univ, Fac Math & Informat Technol, Orenburg 460018, Russia
[5] Univ Leicester, Sch Informat, Leicester LE1 7RH, England
基金
俄罗斯基础研究基金会; 中国国家自然科学基金;
关键词
Authentication; Privacy; Elliptic curve cryptography; Computer architecture; Computational modeling; Cloud computing; Safety; VANETs; fog computing; authenticated key agreement; symmetric cryptography; conditional privacy-preserving; multi-TA; SECURE; EFFICIENT; CLOUD;
D O I
10.1109/TDSC.2021.3135016
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the fog computing concept has been introduced into vehicular ad-hoc networks (VANETs) to formulate fog-based VANETs. Since the communication channels between vehicles and fog nodes are open and insecure, it is necessary to construct an authenticated key agreement (AKA) scheme for securing the channels. The existing AKA schemes have two main deficiencies. One is that the computational and communication overhead are not low enough to satisfy the requirements of delay-sensitive applications. The other is that the multi-trusted-authority (multi-TA) model has not been considered. To solve the deficiencies, we propose a lightweight and conditional privacy-preserving AKA scheme, where the main steps are designed with symmetric cryptography methods. The design can reduce the computational and communication overhead of the AKA process. Additionally, we consider the multi-TA model in the AKA process to solve the single-point-of-failure issue. By integrating Cuckoo filter into the multi-TA model, the secrecy of real identities of legal vehicles is guaranteed and the identity revocation function for illegal vehicles is supported in the AKA process. The security proof and analysis show that our proposed scheme satisfies the essential security and privacy requirements of VANETs. The performance analysis shows that our proposed scheme outperforms other related and represented schemes.
引用
收藏
页码:422 / 436
页数:15
相关论文
共 50 条
  • [1] Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET
    Kumar, Pankaj
    Om, Hari
    VEHICULAR COMMUNICATIONS, 2024, 47
  • [2] Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs
    Zhou, Yousheng
    Long, Xingwang
    Chen, Lvjun
    Yang, Zheng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 (295-301) : 295 - 301
  • [3] LPPA-RCM: A lightweight privacy-preserving authentication scheme for road condition monitoring in fog-based VANETs
    Xu, Yan
    Yao, Chongyue
    Cui, Jie
    Zhong, Hong
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 143
  • [4] A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs
    Wang, Lingling
    Liu, Guozhu
    Sun, Lijun
    SENSORS, 2017, 17 (04)
  • [5] A privacy-preserving biometrics based authenticated key agreement scheme using ECC
    Qi, Mingping
    Chen, Jianhua
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (11)
  • [6] Secure and Lightweight Conditional Privacy-Preserving Authentication for Fog-Based Vehicular Ad Hoc Networks
    Zhong, Hong
    Chen, Lei
    Cui, Jie
    Zhang, Jing
    Bolodurina, Irina
    Liu, Lu
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11): : 8485 - 8497
  • [7] Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol
    Liping Zhang
    Shanyu Tang
    Shaohui Zhu
    Wireless Networks, 2017, 23 : 1901 - 1916
  • [8] CPPABK: conditional privacy-preserving authentication scheme for VANETs based on the key derivation algorithm
    Wang Y.
    Guo X.
    International Journal of Security and Networks, 2023, 18 (04) : 199 - 212
  • [9] Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol
    Zhang, Liping
    Tang, Shanyu
    Zhu, Shaohui
    WIRELESS NETWORKS, 2017, 23 (06) : 1901 - 1916
  • [10] A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps
    Tan, Zuowen
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1384 - 1397