{"title":"铁道车辆对地认证与密钥协商协议的安全性分析与改进","authors":"Teng Long, Yuanyi Dong","doi":"10.1109/CISCE58541.2023.10142684","DOIUrl":null,"url":null,"abstract":"Authentication and key negotiation are the basis for safe railway operation. In response to the security risks of the LTE-R authentication process for next-generation railway wireless communication systems, improvements are made in the framework of the EPS-AKA protocol to generate anonymous identities that will be updated after each authentication, with a timestamp added while the protocol is being executed. The key negotiation phase enables the update of the long-term shared key, eliminating the risk of long-term shared key K leakage. The improved protocol not only achieves IMSI confidentiality protection and resists replay attacks, but also provides forward security. Security and performance analyses show that the improved protocol outperforms existing schemes in terms of computational cost and can meet the requirements for secure and efficient vehicle-to-ground authentication.","PeriodicalId":145263,"journal":{"name":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Analysis and Improvement of Railway Vehicle-to-ground Authentication and Key Negotiation Protocol\",\"authors\":\"Teng Long, Yuanyi Dong\",\"doi\":\"10.1109/CISCE58541.2023.10142684\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Authentication and key negotiation are the basis for safe railway operation. In response to the security risks of the LTE-R authentication process for next-generation railway wireless communication systems, improvements are made in the framework of the EPS-AKA protocol to generate anonymous identities that will be updated after each authentication, with a timestamp added while the protocol is being executed. The key negotiation phase enables the update of the long-term shared key, eliminating the risk of long-term shared key K leakage. The improved protocol not only achieves IMSI confidentiality protection and resists replay attacks, but also provides forward security. Security and performance analyses show that the improved protocol outperforms existing schemes in terms of computational cost and can meet the requirements for secure and efficient vehicle-to-ground authentication.\",\"PeriodicalId\":145263,\"journal\":{\"name\":\"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)\",\"volume\":\"92 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CISCE58541.2023.10142684\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISCE58541.2023.10142684","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Analysis and Improvement of Railway Vehicle-to-ground Authentication and Key Negotiation Protocol
Authentication and key negotiation are the basis for safe railway operation. In response to the security risks of the LTE-R authentication process for next-generation railway wireless communication systems, improvements are made in the framework of the EPS-AKA protocol to generate anonymous identities that will be updated after each authentication, with a timestamp added while the protocol is being executed. The key negotiation phase enables the update of the long-term shared key, eliminating the risk of long-term shared key K leakage. The improved protocol not only achieves IMSI confidentiality protection and resists replay attacks, but also provides forward security. Security and performance analyses show that the improved protocol outperforms existing schemes in terms of computational cost and can meet the requirements for secure and efficient vehicle-to-ground authentication.