Skip to main content

2024 | OriginalPaper | Buchkapitel

Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV

verfasst von : Jinquan Hou, Yuqiu Jian, Guosheng Xu, Qiang Cao, Guoai Xu

Erschienen in: Intelligent Information Processing XII

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The exchange of real-time data between vehicle-to-vehicle communications is crucial in the Internet of Vehicles (IoV) for vehicle-intelligent decisions. However, malicious and false communication data may cause serious personal safety accidents. Confirming the authenticity of the identities of both parties and encrypting communication content before communication is the first line of defense to ensure system security. Therefore, to secure the vehicle-to-vehicle communications, this paper proposes a secure and efficient authentication and key agreement scheme with lightweight operation. Our scheme achieves vehicle-to-vehicle authentication and establishes a session key to encrypt subsequent communication content with only lightweight operations such as symmetric encryption algorithms and hash functions. Furthermore, our scheme provides many ideal attributes, such as forward secrecy, which ensures that the final compromised of the system will not affect the previous communication content. Besides, we prove the security of the proposed scheme through heuristic analysis and BAN logic analysis and analyze the performance of the proposed scheme via comparing the computational cost and communication cost with three state-of-the-art related schemes. The results show that the proposed scheme has high communication efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lu, Z., Qu, G., Liu, Z.: A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans. Intell. Transp. Syst. 20, 760–776 (2018)CrossRef Lu, Z., Qu, G., Liu, Z.: A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans. Intell. Transp. Syst. 20, 760–776 (2018)CrossRef
2.
Zurück zum Zitat Bagga, P., Das, A.K., Wazid, M., Rodrigues, J.J., Park, Y.: Authentication protocols in internet of vehicles: taxonomy, analysis, and challenges. IEEE Access 8, 54314–54344 (2020)CrossRef Bagga, P., Das, A.K., Wazid, M., Rodrigues, J.J., Park, Y.: Authentication protocols in internet of vehicles: taxonomy, analysis, and challenges. IEEE Access 8, 54314–54344 (2020)CrossRef
3.
Zurück zum Zitat Sutrala, A.K., Bagga, P., Das, A.K., Kumar, N., Rodrigues, J.J., Lorenz, P.: On the design of conditional privacy preserving batch verification-based authentication scheme for internet of vehicles deployment. IEEE Trans. Veh. Technol. 69, 5535–5548 (2020)CrossRef Sutrala, A.K., Bagga, P., Das, A.K., Kumar, N., Rodrigues, J.J., Lorenz, P.: On the design of conditional privacy preserving batch verification-based authentication scheme for internet of vehicles deployment. IEEE Trans. Veh. Technol. 69, 5535–5548 (2020)CrossRef
4.
Zurück zum Zitat Fan, B., Zhang, Y., Chen, Y., Meng, L.: Intelligent vehicle lateral control based on radial basis function neural network sliding mode controller. CAAI Trans. Intell. Technol. 7, 455–468 (2022)CrossRef Fan, B., Zhang, Y., Chen, Y., Meng, L.: Intelligent vehicle lateral control based on radial basis function neural network sliding mode controller. CAAI Trans. Intell. Technol. 7, 455–468 (2022)CrossRef
5.
Zurück zum Zitat Li, L., Li, T.: Traceability model based on improved witness mechanism. CAAI Trans. Intell. Technol. 7, 331–339 (2022)CrossRef Li, L., Li, T.: Traceability model based on improved witness mechanism. CAAI Trans. Intell. Technol. 7, 331–339 (2022)CrossRef
6.
Zurück zum Zitat Raw, R.S., Kumar, M., Singh, N.: Security challenges, issues and their solutions for vanet. Int. J. Netw. Secur. Appl. 5(5), 95 (2013) Raw, R.S., Kumar, M., Singh, N.: Security challenges, issues and their solutions for vanet. Int. J. Netw. Secur. Appl. 5(5), 95 (2013)
7.
Zurück zum Zitat Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Workshop on Hot Topics in Networks (HotNets-IV), pp. 1–6 (2005) Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Workshop on Hot Topics in Networks (HotNets-IV), pp. 1–6 (2005)
8.
Zurück zum Zitat Eichler, S.: Strategies for pseudonym changes in vehicularad hoc networks depending on node mobility. In: Proceedings of 2007 IEEE Intelligent Vehicles Symposium, pp. 541–546. IEEE Press, Washington (2007) Eichler, S.: Strategies for pseudonym changes in vehicularad hoc networks depending on node mobility. In: Proceedings of 2007 IEEE Intelligent Vehicles Symposium, pp. 541–546. IEEE Press, Washington (2007)
9.
Zurück zum Zitat Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 1229–1237. IEEE (2008) Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 1229–1237. IEEE (2008)
11.
Zurück zum Zitat Ali, I., Li, F.: An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs. Vehicular Commun. 22, 100228 (2020)CrossRef Ali, I., Li, F.: An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs. Vehicular Commun. 22, 100228 (2020)CrossRef
12.
Zurück zum Zitat Kshetli, N.: Can blockchain strengthen the internet of things? IT Professional 19, 68–72 (2017)CrossRef Kshetli, N.: Can blockchain strengthen the internet of things? IT Professional 19, 68–72 (2017)CrossRef
14.
Zurück zum Zitat Stallings, W.: Cryptography and network security: principles and practice. Int. Ann. Criminol. 46(4), 121–136 (1999) Stallings, W.: Cryptography and network security: principles and practice. Int. Ann. Criminol. 46(4), 121–136 (1999)
16.
Zurück zum Zitat Xiong, H., Guan, Z., Chen, Z., Li, F.: An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219, 225–235 (2013)MathSciNetCrossRef Xiong, H., Guan, Z., Chen, Z., Li, F.: An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219, 225–235 (2013)MathSciNetCrossRef
17.
Zurück zum Zitat Ali, I., Chen, Y., Ullah, N., Kumar, R., He, W.: An efficient and provably secure ecc-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Trans. Veh. Technol. 70(2), 1278–1291 (2021)CrossRef Ali, I., Chen, Y., Ullah, N., Kumar, R., He, W.: An efficient and provably secure ecc-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Trans. Veh. Technol. 70(2), 1278–1291 (2021)CrossRef
19.
Zurück zum Zitat Thumbur, G., Rao, G.S., Reddy, P.V., Gayathri, N., Reddy, D.K., Padmavathamma, M.: Efficient and secure certificateless aggregate signature-based authentication scheme for vehicular ad hoc networks. IEEE Internet Things J. 8(3), 1908–1920 (2020)CrossRef Thumbur, G., Rao, G.S., Reddy, P.V., Gayathri, N., Reddy, D.K., Padmavathamma, M.: Efficient and secure certificateless aggregate signature-based authentication scheme for vehicular ad hoc networks. IEEE Internet Things J. 8(3), 1908–1920 (2020)CrossRef
20.
Zurück zum Zitat Yu, S., Cao, Q., Wang, C., Xu, G.: Efficient ECC-based conditional privacy-preserving aggregation signature scheme in V2V. IEEE Trans. Veh. Technol. 72(11), 15028–15039 (2023) Yu, S., Cao, Q., Wang, C., Xu, G.: Efficient ECC-based conditional privacy-preserving aggregation signature scheme in V2V. IEEE Trans. Veh. Technol. 72(11), 15028–15039 (2023)
Metadaten
Titel
Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV
verfasst von
Jinquan Hou
Yuqiu Jian
Guosheng Xu
Qiang Cao
Guoai Xu
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-57808-3_25