Guosong Yu;Qiong Li;Haokun Mao;Ahmed A. Abd El-Latif;Joel J. P. C. Rodrigues
{"title":"A Multi-Scenario Authenticated Key Exchange Scheme With Forward Secrecy for Fog-Enabled VANETs","authors":"Guosong Yu;Qiong Li;Haokun Mao;Ahmed A. Abd El-Latif;Joel J. P. C. Rodrigues","doi":"10.1109/TVT.2024.3454472","DOIUrl":null,"url":null,"abstract":"Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) communications play crucial roles in Vehicular Ad Hoc Networks (VANETs), enabling real-time data exchange and enhancing road safety. These communication methods necessitate robust authenticated key exchange (AKE) mechanisms to protect user privacy and prevent unauthorized access. Recent research has introduced lightweight V2I AKE schemes that operate without relying on complex asymmetric cryptography. These schemes offer advantages in terms of reduced computational overhead and minimal communication latency. However, their exclusive dependence on long-term secrets compromises forward secrecy, a critical security feature. In response, a novel multi-party V2I AKE protocol based on the ASCON cryptographic algorithm is proposed. Pre-shared keys between entities are dynamically updated at the end of each communication session, achieving forward secrecy while maintaining computational efficiency compared to existing solutions. Additionally, a cross-phase and dual-layer encryption strategy is employed to implement conditional privacy. Building upon this foundation, a fog-enabled and intra-group V2V AKE framework is proposed. Specifically, fog servers are introduced to manage vehicle grouping and distribute group keys. During the V2V AKE phase, fog servers encrypt and forward ephemeral secrets, ensuring resistance against the intra-group impersonation attack with minimal computational overhead. A comprehensive performance analysis of the proposed scheme demonstrates the superiority over existing solutions across various evaluation metrics.","PeriodicalId":13421,"journal":{"name":"IEEE Transactions on Vehicular Technology","volume":"74 1","pages":"831-846"},"PeriodicalIF":7.1000,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Vehicular Technology","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10664446/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) communications play crucial roles in Vehicular Ad Hoc Networks (VANETs), enabling real-time data exchange and enhancing road safety. These communication methods necessitate robust authenticated key exchange (AKE) mechanisms to protect user privacy and prevent unauthorized access. Recent research has introduced lightweight V2I AKE schemes that operate without relying on complex asymmetric cryptography. These schemes offer advantages in terms of reduced computational overhead and minimal communication latency. However, their exclusive dependence on long-term secrets compromises forward secrecy, a critical security feature. In response, a novel multi-party V2I AKE protocol based on the ASCON cryptographic algorithm is proposed. Pre-shared keys between entities are dynamically updated at the end of each communication session, achieving forward secrecy while maintaining computational efficiency compared to existing solutions. Additionally, a cross-phase and dual-layer encryption strategy is employed to implement conditional privacy. Building upon this foundation, a fog-enabled and intra-group V2V AKE framework is proposed. Specifically, fog servers are introduced to manage vehicle grouping and distribute group keys. During the V2V AKE phase, fog servers encrypt and forward ephemeral secrets, ensuring resistance against the intra-group impersonation attack with minimal computational overhead. A comprehensive performance analysis of the proposed scheme demonstrates the superiority over existing solutions across various evaluation metrics.
期刊介绍:
The scope of the Transactions is threefold (which was approved by the IEEE Periodicals Committee in 1967) and is published on the journal website as follows: Communications: The use of mobile radio on land, sea, and air, including cellular radio, two-way radio, and one-way radio, with applications to dispatch and control vehicles, mobile radiotelephone, radio paging, and status monitoring and reporting. Related areas include spectrum usage, component radio equipment such as cavities and antennas, compute control for radio systems, digital modulation and transmission techniques, mobile radio circuit design, radio propagation for vehicular communications, effects of ignition noise and radio frequency interference, and consideration of the vehicle as part of the radio operating environment. Transportation Systems: The use of electronic technology for the control of ground transportation systems including, but not limited to, traffic aid systems; traffic control systems; automatic vehicle identification, location, and monitoring systems; automated transport systems, with single and multiple vehicle control; and moving walkways or people-movers. Vehicular Electronics: The use of electronic or electrical components and systems for control, propulsion, or auxiliary functions, including but not limited to, electronic controls for engineer, drive train, convenience, safety, and other vehicle systems; sensors, actuators, and microprocessors for onboard use; electronic fuel control systems; vehicle electrical components and systems collision avoidance systems; electromagnetic compatibility in the vehicle environment; and electric vehicles and controls.