Three-factor authentication and key agreement protocol with collusion resistance in VANETs

IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Guanlin Pan , Haowen Tan , Wenying Zheng , P. Vijayakumar , Q.M. Jonathan Wu , Audithan Sivaraman
{"title":"Three-factor authentication and key agreement protocol with collusion resistance in VANETs","authors":"Guanlin Pan ,&nbsp;Haowen Tan ,&nbsp;Wenying Zheng ,&nbsp;P. Vijayakumar ,&nbsp;Q.M. Jonathan Wu ,&nbsp;Audithan Sivaraman","doi":"10.1016/j.jisa.2025.104029","DOIUrl":null,"url":null,"abstract":"<div><div>In vehicular ad hoc networks (VANETs), vehicles possess the capability to interact efficiently with a diverse array of services and applications provided by edge vehicular infrastructures. Concurrently, the ongoing interactions among vehicles facilitate the real-time acquisition of crucial road information. However, these vehicular communications primarily occur over unsecured public channels, rendering confidential data susceptible to illegal access by malicious entities. To address this security concern, numerous cryptographic schemes, including the widespread adoption of multi-factor authentication techniques, have been introduced. Despite these efforts, the existing authentication methods are limited, as they solely focus on verifying the legitimacy of individual users, resulting in restricted functionality and diminished security capabilities. So, three-factor authentication and key agreement protocol with collusion resistance in VANETs (TFA-CR) in this paper is developed, which also ensures resistance against collusion attacks. In the proposed design, we leverage hybrid characteristics that encompass both vehicle and user attributes, such as user identity, user-defined parameters, and vehicular verification codes. These attributes are efficiently extracted and utilized throughout the subsequent authentication process, creating a distinctive authentication mechanism tailored for real-world multi-vehicle scenarios. This enables seamless network access for individual users across different vehicles using only a single smart card. A thorough performance evaluation reveals that the protocol effectively reduces both communication overhead and computational complexity when compared to existing authentication techniques.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104029"},"PeriodicalIF":3.8000,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625000675","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

In vehicular ad hoc networks (VANETs), vehicles possess the capability to interact efficiently with a diverse array of services and applications provided by edge vehicular infrastructures. Concurrently, the ongoing interactions among vehicles facilitate the real-time acquisition of crucial road information. However, these vehicular communications primarily occur over unsecured public channels, rendering confidential data susceptible to illegal access by malicious entities. To address this security concern, numerous cryptographic schemes, including the widespread adoption of multi-factor authentication techniques, have been introduced. Despite these efforts, the existing authentication methods are limited, as they solely focus on verifying the legitimacy of individual users, resulting in restricted functionality and diminished security capabilities. So, three-factor authentication and key agreement protocol with collusion resistance in VANETs (TFA-CR) in this paper is developed, which also ensures resistance against collusion attacks. In the proposed design, we leverage hybrid characteristics that encompass both vehicle and user attributes, such as user identity, user-defined parameters, and vehicular verification codes. These attributes are efficiently extracted and utilized throughout the subsequent authentication process, creating a distinctive authentication mechanism tailored for real-world multi-vehicle scenarios. This enables seamless network access for individual users across different vehicles using only a single smart card. A thorough performance evaluation reveals that the protocol effectively reduces both communication overhead and computational complexity when compared to existing authentication techniques.
VANETs中抗合谋的三因素认证与密钥协商协议
在车辆自组织网络(vanet)中,车辆具有与边缘车辆基础设施提供的各种服务和应用程序进行有效交互的能力。同时,车辆之间的持续互动有助于实时获取关键的道路信息。然而,这些车辆通信主要发生在不安全的公共通道上,使得机密数据容易被恶意实体非法访问。为了解决这个安全问题,已经引入了许多加密方案,包括广泛采用的多因素身份验证技术。尽管做出了这些努力,但现有的身份验证方法是有限的,因为它们只关注验证单个用户的合法性,从而导致功能受限和安全性降低。为此,本文提出了VANETs中具有抗合谋能力的三因素认证和密钥协商协议(TFA-CR),该协议保证了对合谋攻击的抵抗能力。在提议的设计中,我们利用了包含车辆和用户属性的混合特征,例如用户身份、用户定义参数和车辆验证码。这些属性被有效地提取出来,并在随后的身份验证过程中加以利用,从而创建了针对实际多车场景量身定制的独特身份验证机制。这使得不同车辆的个人用户只需使用一张智能卡就可以无缝接入网络。全面的性能评估表明,与现有的身份验证技术相比,该协议有效地降低了通信开销和计算复杂度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Information Security and Applications
Journal of Information Security and Applications Computer Science-Computer Networks and Communications
CiteScore
10.90
自引率
5.40%
发文量
206
审稿时长
56 days
期刊介绍: Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信