增强车载通信安全:车联网中V2V通信的双因素认证协议

IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Yan Li, Yuhan Zhang, Xiang Gong
{"title":"增强车载通信安全:车联网中V2V通信的双因素认证协议","authors":"Yan Li,&nbsp;Yuhan Zhang,&nbsp;Xiang Gong","doi":"10.1016/j.jisa.2025.104114","DOIUrl":null,"url":null,"abstract":"<div><div>As a crucial component of intelligent transportation systems, the Internet of Vehicles (IoV) facilitates the intelligent and efficient management of road traffic. The IoV aims to improve the safety and efficiency of road traffic by facilitating the exchange of real-time road information, optimizing the management of traffic flow and effectively reducing traffic accidents. However, since Telematics fails to secure communication between entities involved in communication, it is vulnerable to multiple attacks and faces serious security challenges such as identity forgery, message tampering, and privacy leakage. Currently available authentication schemes, limited by their reliance on a single verification method, often fall short in resisting attacks and protecting privacy, and they cannot meet the lightweight requirements. To address these challenges, this paper proposes a two-factor Authentication and Key Exchange(AKE) protocol for Vehicle-to-Vehicle (V2V) communication. The proposed protocol combines password-based and biometric authentication with homomorphic hashing and Physically Unclonable Functions (PUF) to achieve dual-factor authentication and secure key exchange. While ensuring high efficiency, the proposed protocol effectively mitigates various known attacks, significantly enhancing the overall security of IoV. We conducted both formal and informal security analyses of the proposed protocol, utilizing the widely recognized Scyther tool for the formal security verification of the Internet security protocol. Comparative analysis with existing advanced authentication protocols demonstrates that our proposed protocol better satisfies the security requirements of IoV.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"92 ","pages":"Article 104114"},"PeriodicalIF":3.7000,"publicationDate":"2025-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing vehicular communication security: A two-factor authentication protocol for V2V communications in IoV\",\"authors\":\"Yan Li,&nbsp;Yuhan Zhang,&nbsp;Xiang Gong\",\"doi\":\"10.1016/j.jisa.2025.104114\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>As a crucial component of intelligent transportation systems, the Internet of Vehicles (IoV) facilitates the intelligent and efficient management of road traffic. The IoV aims to improve the safety and efficiency of road traffic by facilitating the exchange of real-time road information, optimizing the management of traffic flow and effectively reducing traffic accidents. However, since Telematics fails to secure communication between entities involved in communication, it is vulnerable to multiple attacks and faces serious security challenges such as identity forgery, message tampering, and privacy leakage. Currently available authentication schemes, limited by their reliance on a single verification method, often fall short in resisting attacks and protecting privacy, and they cannot meet the lightweight requirements. To address these challenges, this paper proposes a two-factor Authentication and Key Exchange(AKE) protocol for Vehicle-to-Vehicle (V2V) communication. The proposed protocol combines password-based and biometric authentication with homomorphic hashing and Physically Unclonable Functions (PUF) to achieve dual-factor authentication and secure key exchange. While ensuring high efficiency, the proposed protocol effectively mitigates various known attacks, significantly enhancing the overall security of IoV. We conducted both formal and informal security analyses of the proposed protocol, utilizing the widely recognized Scyther tool for the formal security verification of the Internet security protocol. Comparative analysis with existing advanced authentication protocols demonstrates that our proposed protocol better satisfies the security requirements of IoV.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"92 \",\"pages\":\"Article 104114\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2025-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625001516\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001516","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

车联网(Internet of vehicle, IoV)是智能交通系统的重要组成部分,有助于实现道路交通的智能、高效管理。车联网旨在通过促进实时道路信息的交换,优化交通流量管理,有效减少交通事故,提高道路交通的安全性和效率。但是,由于Telematics不能保证通信主体之间的通信安全,容易受到多种攻击,面临身份伪造、消息篡改、隐私泄露等严重的安全挑战。现有的认证方案受单一验证方法的限制,往往在抗攻击和保护隐私方面存在不足,且不能满足轻量级的要求。为了解决这些挑战,本文提出了一种用于车对车(V2V)通信的双因素认证和密钥交换(AKE)协议。该协议将基于密码和生物特征的认证与同态哈希和物理不可克隆函数(PUF)相结合,实现了双因素认证和安全密钥交换。在保证高效的同时,有效抵御各种已知攻击,显著提升车联网整体安全性。我们对提议的协议进行了正式和非正式的安全分析,利用广泛认可的Scyther工具对互联网安全协议进行了正式的安全验证。与现有高级认证协议的对比分析表明,本文提出的协议更能满足车联网的安全要求。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Enhancing vehicular communication security: A two-factor authentication protocol for V2V communications in IoV
As a crucial component of intelligent transportation systems, the Internet of Vehicles (IoV) facilitates the intelligent and efficient management of road traffic. The IoV aims to improve the safety and efficiency of road traffic by facilitating the exchange of real-time road information, optimizing the management of traffic flow and effectively reducing traffic accidents. However, since Telematics fails to secure communication between entities involved in communication, it is vulnerable to multiple attacks and faces serious security challenges such as identity forgery, message tampering, and privacy leakage. Currently available authentication schemes, limited by their reliance on a single verification method, often fall short in resisting attacks and protecting privacy, and they cannot meet the lightweight requirements. To address these challenges, this paper proposes a two-factor Authentication and Key Exchange(AKE) protocol for Vehicle-to-Vehicle (V2V) communication. The proposed protocol combines password-based and biometric authentication with homomorphic hashing and Physically Unclonable Functions (PUF) to achieve dual-factor authentication and secure key exchange. While ensuring high efficiency, the proposed protocol effectively mitigates various known attacks, significantly enhancing the overall security of IoV. We conducted both formal and informal security analyses of the proposed protocol, utilizing the widely recognized Scyther tool for the formal security verification of the Internet security protocol. Comparative analysis with existing advanced authentication protocols demonstrates that our proposed protocol better satisfies the security requirements of IoV.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Information Security and Applications
Journal of Information Security and Applications Computer Science-Computer Networks and Communications
CiteScore
10.90
自引率
5.40%
发文量
206
审稿时长
56 days
期刊介绍: Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信