{"title":"A dynamic C-V2X anonymous authentication and group key agreement protocol","authors":"Beibei Cui, Wei He, Yan Cui","doi":"10.1007/s10207-024-00876-2","DOIUrl":null,"url":null,"abstract":"<p>At present, in addressing security challenges within 5 G-era Vehicular Ad-Hoc Networks (VANET), a new protocol has been designed in this paper, named V2X-GKA (Dynamic Group Authentication and Key Agreement Protocol based on C-V2X). V2X-GKA utilizes cryptographic techniques such as ECDLP and DBDH to effectively mitigate risks associated with certificate forgery and key theft. Through the integration of authentication and group key agreement mechanisms, the protocol facilitates dynamic member management and secure key updates without necessitating complete protocol re-execution. This approach not only ensures both forward and backward security but also optimizes algorithmic processes, rendering it highly suitable for real-time, high-speed mobile environments. Through necessary security analysis, it is confirmed that the V2X-GKA scheme in this paper meets the existing security objectives. Compared with other similar schemes, it exhibits a certain degree of completeness and superiority, particularly in open-channel scenarios.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"47 1","pages":""},"PeriodicalIF":2.4000,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s10207-024-00876-2","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
At present, in addressing security challenges within 5 G-era Vehicular Ad-Hoc Networks (VANET), a new protocol has been designed in this paper, named V2X-GKA (Dynamic Group Authentication and Key Agreement Protocol based on C-V2X). V2X-GKA utilizes cryptographic techniques such as ECDLP and DBDH to effectively mitigate risks associated with certificate forgery and key theft. Through the integration of authentication and group key agreement mechanisms, the protocol facilitates dynamic member management and secure key updates without necessitating complete protocol re-execution. This approach not only ensures both forward and backward security but also optimizes algorithmic processes, rendering it highly suitable for real-time, high-speed mobile environments. Through necessary security analysis, it is confirmed that the V2X-GKA scheme in this paper meets the existing security objectives. Compared with other similar schemes, it exhibits a certain degree of completeness and superiority, particularly in open-channel scenarios.
期刊介绍:
The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation.
Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: watermarking, software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility.