An efficient authentication scheme for vehicular networks based on Merkle tree

IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Guijiang Liu , Hao Lu , Wenming Wang , Haiping Huang
{"title":"An efficient authentication scheme for vehicular networks based on Merkle tree","authors":"Guijiang Liu ,&nbsp;Hao Lu ,&nbsp;Wenming Wang ,&nbsp;Haiping Huang","doi":"10.1016/j.comnet.2025.111429","DOIUrl":null,"url":null,"abstract":"<div><div>The rapid development of vehicular networks has significantly enhanced driving safety and promoted the widespread application of intelligent transportation systems. However, in scenarios involving authentication between vehicles and servers, vehicular networks still face challenges such as privacy protection, low authentication efficiency, and heavy computational burdens. We propose an efficient and fast authentication scheme that allows vehicles to access the server multiple times quickly with a single authentication. The scheme combines elliptic curve groups, bilinear mappings, and Merkle Hash Trees to provide a more secure, scalable, and efficient access control mechanism. After the initial authentication, vehicles can perform subsequent access requests without repeated authentication, significantly reducing the authentication overhead and improving system performance. By using non-interactive zero-knowledge proofs and Merkle Hash Tree-based log structures, the scheme effectively ensures the integrity of access records and prevents replay attacks and unauthorized access. Through rigorous security proofs and detailed security analysis, we demonstrate that the proposed scheme meets the security requirements of vehicular networks and is capable of resisting a wide range of security attacks. Performance evaluation results show that the proposed scheme outperforms existing related schemes in terms of both communication and computational overhead.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"269 ","pages":"Article 111429"},"PeriodicalIF":4.6000,"publicationDate":"2025-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625003962","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid development of vehicular networks has significantly enhanced driving safety and promoted the widespread application of intelligent transportation systems. However, in scenarios involving authentication between vehicles and servers, vehicular networks still face challenges such as privacy protection, low authentication efficiency, and heavy computational burdens. We propose an efficient and fast authentication scheme that allows vehicles to access the server multiple times quickly with a single authentication. The scheme combines elliptic curve groups, bilinear mappings, and Merkle Hash Trees to provide a more secure, scalable, and efficient access control mechanism. After the initial authentication, vehicles can perform subsequent access requests without repeated authentication, significantly reducing the authentication overhead and improving system performance. By using non-interactive zero-knowledge proofs and Merkle Hash Tree-based log structures, the scheme effectively ensures the integrity of access records and prevents replay attacks and unauthorized access. Through rigorous security proofs and detailed security analysis, we demonstrate that the proposed scheme meets the security requirements of vehicular networks and is capable of resisting a wide range of security attacks. Performance evaluation results show that the proposed scheme outperforms existing related schemes in terms of both communication and computational overhead.
基于Merkle树的高效车载网络认证方案
车联网的快速发展极大地提高了行车安全性,促进了智能交通系统的广泛应用。然而,在涉及车辆与服务器之间认证的场景中,车载网络仍然面临隐私保护、认证效率低、计算负担大等挑战。我们提出了一种高效快速的身份验证方案,允许车辆通过一次身份验证快速访问服务器多次。该方案将椭圆曲线组、双线性映射和Merkle哈希树相结合,提供了一种更安全、可扩展、高效的访问控制机制。初始认证完成后,车辆无需重复认证即可执行后续访问请求,大大降低了认证开销,提高了系统性能。该方案通过非交互式零知识证明和基于Merkle哈希树的日志结构,有效地保证了访问记录的完整性,防止了重放攻击和未经授权的访问。通过严格的安全证明和详细的安全分析,我们证明了所提出的方案能够满足车载网络的安全要求,并且能够抵御各种安全攻击。性能评估结果表明,该方案在通信和计算开销方面都优于现有的相关方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Computer Networks
Computer Networks 工程技术-电信学
CiteScore
10.80
自引率
3.60%
发文量
434
审稿时长
8.6 months
期刊介绍: Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信