Guijiang Liu , Hao Lu , Wenming Wang , Haiping Huang
{"title":"An efficient authentication scheme for vehicular networks based on Merkle tree","authors":"Guijiang Liu , Hao Lu , Wenming Wang , Haiping Huang","doi":"10.1016/j.comnet.2025.111429","DOIUrl":null,"url":null,"abstract":"<div><div>The rapid development of vehicular networks has significantly enhanced driving safety and promoted the widespread application of intelligent transportation systems. However, in scenarios involving authentication between vehicles and servers, vehicular networks still face challenges such as privacy protection, low authentication efficiency, and heavy computational burdens. We propose an efficient and fast authentication scheme that allows vehicles to access the server multiple times quickly with a single authentication. The scheme combines elliptic curve groups, bilinear mappings, and Merkle Hash Trees to provide a more secure, scalable, and efficient access control mechanism. After the initial authentication, vehicles can perform subsequent access requests without repeated authentication, significantly reducing the authentication overhead and improving system performance. By using non-interactive zero-knowledge proofs and Merkle Hash Tree-based log structures, the scheme effectively ensures the integrity of access records and prevents replay attacks and unauthorized access. Through rigorous security proofs and detailed security analysis, we demonstrate that the proposed scheme meets the security requirements of vehicular networks and is capable of resisting a wide range of security attacks. Performance evaluation results show that the proposed scheme outperforms existing related schemes in terms of both communication and computational overhead.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"269 ","pages":"Article 111429"},"PeriodicalIF":4.6000,"publicationDate":"2025-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625003962","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
The rapid development of vehicular networks has significantly enhanced driving safety and promoted the widespread application of intelligent transportation systems. However, in scenarios involving authentication between vehicles and servers, vehicular networks still face challenges such as privacy protection, low authentication efficiency, and heavy computational burdens. We propose an efficient and fast authentication scheme that allows vehicles to access the server multiple times quickly with a single authentication. The scheme combines elliptic curve groups, bilinear mappings, and Merkle Hash Trees to provide a more secure, scalable, and efficient access control mechanism. After the initial authentication, vehicles can perform subsequent access requests without repeated authentication, significantly reducing the authentication overhead and improving system performance. By using non-interactive zero-knowledge proofs and Merkle Hash Tree-based log structures, the scheme effectively ensures the integrity of access records and prevents replay attacks and unauthorized access. Through rigorous security proofs and detailed security analysis, we demonstrate that the proposed scheme meets the security requirements of vehicular networks and is capable of resisting a wide range of security attacks. Performance evaluation results show that the proposed scheme outperforms existing related schemes in terms of both communication and computational overhead.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.