Kai Wang;Jiankuo Dong;Shiqin Wang;Zhijian Yuan;Letian Sha;Fu Xiao
{"title":"RSAKA-VDT:设计可靠且可证明安全的车载数字孪生网络认证密钥协议方案","authors":"Kai Wang;Jiankuo Dong;Shiqin Wang;Zhijian Yuan;Letian Sha;Fu Xiao","doi":"10.1109/TVT.2025.3552481","DOIUrl":null,"url":null,"abstract":"The vehicular digital twin (VDT) networks are an emerging network paradigm that are facilitating connected and autonomous vehicles. However, autonomous vehicles transmit real-time sensing privacy data to their corresponding digital twin representations through public communication channels within VDT intra-twin communication, thus exposing this communication to various threats of attack and potential data tampering. On this basis, a reliable and efficient data transmission scheme is urgently needed to ensure secure fine-grained data access control. In this context, this article introduced a new authenticated key agreement scheme, termed RSAKA-VDT, to authenticate user identity and enable confidential service data access. In particular, only vehicle users with proper access permissions are allowed to calculate the shared session key. The associated VDTs are deployed on the network edge in the suggested RSAKA-VDT. Identity authentication and session key negotiation are carried out between an autonomous vehicle user and the affiliated edge server. Subsequently, the generated session key encrypts real-time privacy data, ensuring secure data exchange for VDT intra-twin communication. Furthermore, we validated the security features of RSAKA-VDT using the random oracle model, heuristic security analysis, and the “automated validation of Internet security protocols and applications” (AVISPA) software tool. Finally, we conducted a comparative analysis of RSAKA-VDT against six closely related user authentication schemes, evaluating security functionality attributes, computational costs, and communication overheads. Comparative performance results show that RSAKA-VDT meets all 18 security evaluation criteria while maintaining a better balance between practical usability and requirements for security functionality.","PeriodicalId":13421,"journal":{"name":"IEEE Transactions on Vehicular Technology","volume":"74 8","pages":"12330-12346"},"PeriodicalIF":7.1000,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"RSAKA-VDT: Designing Reliable and Provably Secure Authenticated Key Agreement Scheme for Vehicular Digital Twin Networks\",\"authors\":\"Kai Wang;Jiankuo Dong;Shiqin Wang;Zhijian Yuan;Letian Sha;Fu Xiao\",\"doi\":\"10.1109/TVT.2025.3552481\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The vehicular digital twin (VDT) networks are an emerging network paradigm that are facilitating connected and autonomous vehicles. However, autonomous vehicles transmit real-time sensing privacy data to their corresponding digital twin representations through public communication channels within VDT intra-twin communication, thus exposing this communication to various threats of attack and potential data tampering. On this basis, a reliable and efficient data transmission scheme is urgently needed to ensure secure fine-grained data access control. In this context, this article introduced a new authenticated key agreement scheme, termed RSAKA-VDT, to authenticate user identity and enable confidential service data access. In particular, only vehicle users with proper access permissions are allowed to calculate the shared session key. The associated VDTs are deployed on the network edge in the suggested RSAKA-VDT. Identity authentication and session key negotiation are carried out between an autonomous vehicle user and the affiliated edge server. Subsequently, the generated session key encrypts real-time privacy data, ensuring secure data exchange for VDT intra-twin communication. Furthermore, we validated the security features of RSAKA-VDT using the random oracle model, heuristic security analysis, and the “automated validation of Internet security protocols and applications” (AVISPA) software tool. Finally, we conducted a comparative analysis of RSAKA-VDT against six closely related user authentication schemes, evaluating security functionality attributes, computational costs, and communication overheads. Comparative performance results show that RSAKA-VDT meets all 18 security evaluation criteria while maintaining a better balance between practical usability and requirements for security functionality.\",\"PeriodicalId\":13421,\"journal\":{\"name\":\"IEEE Transactions on Vehicular Technology\",\"volume\":\"74 8\",\"pages\":\"12330-12346\"},\"PeriodicalIF\":7.1000,\"publicationDate\":\"2025-03-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Vehicular Technology\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10930839/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Vehicular Technology","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10930839/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
RSAKA-VDT: Designing Reliable and Provably Secure Authenticated Key Agreement Scheme for Vehicular Digital Twin Networks
The vehicular digital twin (VDT) networks are an emerging network paradigm that are facilitating connected and autonomous vehicles. However, autonomous vehicles transmit real-time sensing privacy data to their corresponding digital twin representations through public communication channels within VDT intra-twin communication, thus exposing this communication to various threats of attack and potential data tampering. On this basis, a reliable and efficient data transmission scheme is urgently needed to ensure secure fine-grained data access control. In this context, this article introduced a new authenticated key agreement scheme, termed RSAKA-VDT, to authenticate user identity and enable confidential service data access. In particular, only vehicle users with proper access permissions are allowed to calculate the shared session key. The associated VDTs are deployed on the network edge in the suggested RSAKA-VDT. Identity authentication and session key negotiation are carried out between an autonomous vehicle user and the affiliated edge server. Subsequently, the generated session key encrypts real-time privacy data, ensuring secure data exchange for VDT intra-twin communication. Furthermore, we validated the security features of RSAKA-VDT using the random oracle model, heuristic security analysis, and the “automated validation of Internet security protocols and applications” (AVISPA) software tool. Finally, we conducted a comparative analysis of RSAKA-VDT against six closely related user authentication schemes, evaluating security functionality attributes, computational costs, and communication overheads. Comparative performance results show that RSAKA-VDT meets all 18 security evaluation criteria while maintaining a better balance between practical usability and requirements for security functionality.
期刊介绍:
The scope of the Transactions is threefold (which was approved by the IEEE Periodicals Committee in 1967) and is published on the journal website as follows: Communications: The use of mobile radio on land, sea, and air, including cellular radio, two-way radio, and one-way radio, with applications to dispatch and control vehicles, mobile radiotelephone, radio paging, and status monitoring and reporting. Related areas include spectrum usage, component radio equipment such as cavities and antennas, compute control for radio systems, digital modulation and transmission techniques, mobile radio circuit design, radio propagation for vehicular communications, effects of ignition noise and radio frequency interference, and consideration of the vehicle as part of the radio operating environment. Transportation Systems: The use of electronic technology for the control of ground transportation systems including, but not limited to, traffic aid systems; traffic control systems; automatic vehicle identification, location, and monitoring systems; automated transport systems, with single and multiple vehicle control; and moving walkways or people-movers. Vehicular Electronics: The use of electronic or electrical components and systems for control, propulsion, or auxiliary functions, including but not limited to, electronic controls for engineer, drive train, convenience, safety, and other vehicle systems; sensors, actuators, and microprocessors for onboard use; electronic fuel control systems; vehicle electrical components and systems collision avoidance systems; electromagnetic compatibility in the vehicle environment; and electric vehicles and controls.