Enhancing security and trust using efficient privacy-preserving authentication in vehicular edge computing networks

IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Vehicular Communications Pub Date : 2025-08-01 Epub Date: 2025-04-17 DOI:10.1016/j.vehcom.2025.100921
Anwar Ghani , Saeed Ullah Jan , Shehzad Ashraf Chaudhry , Rashid Ahmad , Ashok Kumar Das , Do Hyeun Kim
{"title":"Enhancing security and trust using efficient privacy-preserving authentication in vehicular edge computing networks","authors":"Anwar Ghani ,&nbsp;Saeed Ullah Jan ,&nbsp;Shehzad Ashraf Chaudhry ,&nbsp;Rashid Ahmad ,&nbsp;Ashok Kumar Das ,&nbsp;Do Hyeun Kim","doi":"10.1016/j.vehcom.2025.100921","DOIUrl":null,"url":null,"abstract":"<div><div>The Internet of Vehicles (IoV) requires advanced safety, security, and services in Intelligent Transportation Systems (ITS). Frequent broadcast message intervals and Dedicated Short-Range Communication (DSRC) make validating messages in such short timeframes extremely challenging. Additionally, current authentication protocols cannot meet the demands of the environment due to high communication and computational overheads. Furthermore, lightweight authentication proposals have been put forth to solve the problem; however, such attempts cannot provide a sophisticated solution that can handle advanced security needs and suffer from accuracy issues. This article presents a two-factor authentication protocol using lightweight cryptographic operations such as one-way hashing and exclusive OR (XOR) with acceptable efficiency and security. The identities are generated using Physically Unclonable Functions (PUFs), passwords, and randomized nonces to ensure two-factor authentication. The proposal is rigorously verified through formal security analysis, confirming that the protocol is untraceable, anonymous, protects key secrecy, and is resistant to well-known attacks in the IoV domain. The performance analysis confirms its robustness and reliability, with 43.31% low energy consumption in terms of computation, communication, and support for more security requirements, making it a feasible solution for the IoV domain.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100921"},"PeriodicalIF":6.5000,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Vehicular Communications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214209625000488","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2025/4/17 0:00:00","PubModel":"Epub","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Vehicles (IoV) requires advanced safety, security, and services in Intelligent Transportation Systems (ITS). Frequent broadcast message intervals and Dedicated Short-Range Communication (DSRC) make validating messages in such short timeframes extremely challenging. Additionally, current authentication protocols cannot meet the demands of the environment due to high communication and computational overheads. Furthermore, lightweight authentication proposals have been put forth to solve the problem; however, such attempts cannot provide a sophisticated solution that can handle advanced security needs and suffer from accuracy issues. This article presents a two-factor authentication protocol using lightweight cryptographic operations such as one-way hashing and exclusive OR (XOR) with acceptable efficiency and security. The identities are generated using Physically Unclonable Functions (PUFs), passwords, and randomized nonces to ensure two-factor authentication. The proposal is rigorously verified through formal security analysis, confirming that the protocol is untraceable, anonymous, protects key secrecy, and is resistant to well-known attacks in the IoV domain. The performance analysis confirms its robustness and reliability, with 43.31% low energy consumption in terms of computation, communication, and support for more security requirements, making it a feasible solution for the IoV domain.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在车载边缘计算网络中使用高效的隐私保护认证增强安全性和信任度
车联网(IoV)对智能交通系统(ITS)的安全性、安全性和服务提出了更高的要求。频繁的广播消息间隔和专用短程通信(DSRC)使得在如此短的时间内验证消息极具挑战性。此外,现有的认证协议由于通信和计算开销大,无法满足环境的要求。此外,还提出了轻量级认证方案来解决这个问题;然而,这样的尝试不能提供一个复杂的解决方案来处理高级安全需求,并受到准确性问题的影响。本文介绍了一种双因素身份验证协议,该协议使用轻量级加密操作,如单向散列和异或(XOR),具有可接受的效率和安全性。这些身份是使用物理不可克隆函数(puf)、密码和随机值生成的,以确保双因素身份验证。该提案通过正式的安全分析进行严格验证,确认该协议具有不可追踪性,匿名性,保护密钥保密性,并且可以抵抗IoV领域的众所周知的攻击。性能分析证实了该方案的鲁棒性和可靠性,在计算、通信和支持更多安全需求方面能耗低43.31%,是一种可行的车联网解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Vehicular Communications
Vehicular Communications Engineering-Electrical and Electronic Engineering
CiteScore
12.70
自引率
10.40%
发文量
88
审稿时长
62 days
期刊介绍: Vehicular communications is a growing area of communications between vehicles and including roadside communication infrastructure. Advances in wireless communications are making possible sharing of information through real time communications between vehicles and infrastructure. This has led to applications to increase safety of vehicles and communication between passengers and the Internet. Standardization efforts on vehicular communication are also underway to make vehicular transportation safer, greener and easier. The aim of the journal is to publish high quality peer–reviewed papers in the area of vehicular communications. The scope encompasses all types of communications involving vehicles, including vehicle–to–vehicle and vehicle–to–infrastructure. The scope includes (but not limited to) the following topics related to vehicular communications: Vehicle to vehicle and vehicle to infrastructure communications Channel modelling, modulating and coding Congestion Control and scalability issues Protocol design, testing and verification Routing in vehicular networks Security issues and countermeasures Deployment and field testing Reducing energy consumption and enhancing safety of vehicles Wireless in–car networks Data collection and dissemination methods Mobility and handover issues Safety and driver assistance applications UAV Underwater communications Autonomous cooperative driving Social networks Internet of vehicles Standardization of protocols.
期刊最新文献
Secure communication via UAV-mounted multifunctional active STAR-RIS: joint optimization of trajectory, mode switching, and beamforming for integrated sensing and communication A blockchain-empowered decentralized and secure spectrum allocation for wireless vehicular communications Energy-efficient secure communication in UAV-RIS assisted networks: Joint trajectory and robust beamforming optimization under imperfect eavesdropper CSI A trust-centric contract incentive mechanism for collaborative parked computing vehicle framework Load-aware semi-centralized virtual network embedding for LEO satellite-assisted internet of vehicles
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1