{"title":"用于车联网的高度安全认证和密钥协议","authors":"Li Li, XingJuan Fan, BoYuan Zhi, ShaoJun Li, Seyyed Amirreza Dabollahi","doi":"10.1007/s11235-024-01172-z","DOIUrl":null,"url":null,"abstract":"<p>In the contemporary era, the Internet of Vehicles (IoV) plays a pivotal role in traffic management, especially in the context of highly scalable and dynamic 5 G networks. Safeguarding these networks presents numerous challenges, particularly in controlling access for unauthenticated users and establishing secure key agreements with fine-grained access control. Balancing these security measures is vital to prevent unauthorized information flow while aligning with the promising goals of future generation technologies. Despite numerous related studies being conducted, existing schemes face risks such as privacy breaches, identity tracing, and substantial computation overheads. Consequently, there is an urgent need to introduce a more secure and efficient scheme to counter various attacks. This paper introduces an authenticated key agreement scheme, tailored for fog-based IoV. The scheme’s security is established under the Random Oracle Model and verified using the ProVerif tool. Additionally, a performance assessment is conducted, demonstrating that the proposed protocol simultaneously meets both security and efficiency requirements when compared to several related schemes.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"7 1","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Highly secure authentication and key agreement protocol for the internet of vehicles\",\"authors\":\"Li Li, XingJuan Fan, BoYuan Zhi, ShaoJun Li, Seyyed Amirreza Dabollahi\",\"doi\":\"10.1007/s11235-024-01172-z\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>In the contemporary era, the Internet of Vehicles (IoV) plays a pivotal role in traffic management, especially in the context of highly scalable and dynamic 5 G networks. Safeguarding these networks presents numerous challenges, particularly in controlling access for unauthenticated users and establishing secure key agreements with fine-grained access control. Balancing these security measures is vital to prevent unauthorized information flow while aligning with the promising goals of future generation technologies. Despite numerous related studies being conducted, existing schemes face risks such as privacy breaches, identity tracing, and substantial computation overheads. Consequently, there is an urgent need to introduce a more secure and efficient scheme to counter various attacks. This paper introduces an authenticated key agreement scheme, tailored for fog-based IoV. The scheme’s security is established under the Random Oracle Model and verified using the ProVerif tool. Additionally, a performance assessment is conducted, demonstrating that the proposed protocol simultaneously meets both security and efficiency requirements when compared to several related schemes.</p>\",\"PeriodicalId\":51194,\"journal\":{\"name\":\"Telecommunication Systems\",\"volume\":\"7 1\",\"pages\":\"\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2024-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Telecommunication Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11235-024-01172-z\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Telecommunication Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11235-024-01172-z","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
摘要
当今时代,车联网(IoV)在交通管理中发挥着举足轻重的作用,尤其是在高度可扩展和动态的 5 G 网络背景下。保障这些网络的安全面临诸多挑战,特别是在控制未经认证用户的访问和建立具有细粒度访问控制的安全密钥协议方面。平衡这些安全措施对于防止未经授权的信息流动,同时实现未来新一代技术的远大目标至关重要。尽管开展了大量相关研究,但现有方案仍面临隐私泄露、身份追踪和大量计算开销等风险。因此,迫切需要引入一种更安全、更高效的方案来应对各种攻击。本文介绍了一种为基于雾的物联网量身定制的认证密钥协议方案。该方案在随机甲骨文模型下建立了安全性,并使用 ProVerif 工具进行了验证。此外,还进行了性能评估,表明与几种相关方案相比,所提出的协议同时满足了安全性和效率要求。
Highly secure authentication and key agreement protocol for the internet of vehicles
In the contemporary era, the Internet of Vehicles (IoV) plays a pivotal role in traffic management, especially in the context of highly scalable and dynamic 5 G networks. Safeguarding these networks presents numerous challenges, particularly in controlling access for unauthenticated users and establishing secure key agreements with fine-grained access control. Balancing these security measures is vital to prevent unauthorized information flow while aligning with the promising goals of future generation technologies. Despite numerous related studies being conducted, existing schemes face risks such as privacy breaches, identity tracing, and substantial computation overheads. Consequently, there is an urgent need to introduce a more secure and efficient scheme to counter various attacks. This paper introduces an authenticated key agreement scheme, tailored for fog-based IoV. The scheme’s security is established under the Random Oracle Model and verified using the ProVerif tool. Additionally, a performance assessment is conducted, demonstrating that the proposed protocol simultaneously meets both security and efficiency requirements when compared to several related schemes.
期刊介绍:
Telecommunication Systems is a journal covering all aspects of modeling, analysis, design and management of telecommunication systems. The journal publishes high quality articles dealing with the use of analytic and quantitative tools for the modeling, analysis, design and management of telecommunication systems covering:
Performance Evaluation of Wide Area and Local Networks;
Network Interconnection;
Wire, wireless, Adhoc, mobile networks;
Impact of New Services (economic and organizational impact);
Fiberoptics and photonic switching;
DSL, ADSL, cable TV and their impact;
Design and Analysis Issues in Metropolitan Area Networks;
Networking Protocols;
Dynamics and Capacity Expansion of Telecommunication Systems;
Multimedia Based Systems, Their Design Configuration and Impact;
Configuration of Distributed Systems;
Pricing for Networking and Telecommunication Services;
Performance Analysis of Local Area Networks;
Distributed Group Decision Support Systems;
Configuring Telecommunication Systems with Reliability and Availability;
Cost Benefit Analysis and Economic Impact of Telecommunication Systems;
Standardization and Regulatory Issues;
Security, Privacy and Encryption in Telecommunication Systems;
Cellular, Mobile and Satellite Based Systems.