{"title":"一种高效、可撤销的基于puf的vanet V2R互通信安全认证方案","authors":"Jiping Li;Jing Chen;Yining Liu;Shouyin Liu;Yuanyuan Zhang","doi":"10.1109/JIOT.2025.3585643","DOIUrl":null,"url":null,"abstract":"In vehicular ad hoc networks (VANETs), vehicles and roadside units (RSUs) utilize open wireless channels to exchange safety-critical data, facilitating real-time decision-making for enhanced road safety and traffic management efficiency in intelligent transportation systems (ITSs). However, the openness of these channels exposes them to various security threats. Malicious adversaries may impersonate RSUs to forge and distribute harmful commands, manipulating vehicular behavior, or masquerade as legitimate vehicles to bypass authentication protocols and gain unauthorized access. Such attacks jeopardize the security and functionality of the VANETs, underscoring the necessity of robust mutual authentication between vehicles and RSUs. Existing centralized trust authority (TA)-dependent schemes for vehicle-to-RSU (V2R) authentication incur high-computational overhead, introduce authentication latency, and cause a single point of failure, particularly in dense traffic scenarios. To address these challenges, we propose efficient, revocable authentication scheme with session key negotiation (ERAS2KN), an efficient and revocable authentication scheme with session key negotiation. By integrating physical unclonable functions (PUFs) with lightweight cryptography, such as one-way hash functions, bitwise <sc>xor</small>, and symmetric encryption, ERAS2KN enables rapid mutual authentication and secure session key establishment. Comprehensive security analysis, including informal evaluation, formal security proof based on the real-or-random (RoR) model, and automated validation using AVISPA, confirms ERAS2KN’s resilience against vehicle impersonation, eavesdropping, vehicle/RSU compromise, man-in-the-middle, and other advance attacks. Performance evaluations demonstrate that ERAS2KN surpasses existing schemes by delivering enhanced security features while achieving the lowest computational overhead, communication overhead, and energy consumption cost, making it ideal for high-density VANETs environments.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 18","pages":"37974-37987"},"PeriodicalIF":8.9000,"publicationDate":"2025-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Efficient and Revocable PUF-Based Authentication Scheme for Secure V2R Mutual Communication in VANETs\",\"authors\":\"Jiping Li;Jing Chen;Yining Liu;Shouyin Liu;Yuanyuan Zhang\",\"doi\":\"10.1109/JIOT.2025.3585643\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In vehicular ad hoc networks (VANETs), vehicles and roadside units (RSUs) utilize open wireless channels to exchange safety-critical data, facilitating real-time decision-making for enhanced road safety and traffic management efficiency in intelligent transportation systems (ITSs). However, the openness of these channels exposes them to various security threats. Malicious adversaries may impersonate RSUs to forge and distribute harmful commands, manipulating vehicular behavior, or masquerade as legitimate vehicles to bypass authentication protocols and gain unauthorized access. Such attacks jeopardize the security and functionality of the VANETs, underscoring the necessity of robust mutual authentication between vehicles and RSUs. Existing centralized trust authority (TA)-dependent schemes for vehicle-to-RSU (V2R) authentication incur high-computational overhead, introduce authentication latency, and cause a single point of failure, particularly in dense traffic scenarios. To address these challenges, we propose efficient, revocable authentication scheme with session key negotiation (ERAS2KN), an efficient and revocable authentication scheme with session key negotiation. By integrating physical unclonable functions (PUFs) with lightweight cryptography, such as one-way hash functions, bitwise <sc>xor</small>, and symmetric encryption, ERAS2KN enables rapid mutual authentication and secure session key establishment. Comprehensive security analysis, including informal evaluation, formal security proof based on the real-or-random (RoR) model, and automated validation using AVISPA, confirms ERAS2KN’s resilience against vehicle impersonation, eavesdropping, vehicle/RSU compromise, man-in-the-middle, and other advance attacks. Performance evaluations demonstrate that ERAS2KN surpasses existing schemes by delivering enhanced security features while achieving the lowest computational overhead, communication overhead, and energy consumption cost, making it ideal for high-density VANETs environments.\",\"PeriodicalId\":54347,\"journal\":{\"name\":\"IEEE Internet of Things Journal\",\"volume\":\"12 18\",\"pages\":\"37974-37987\"},\"PeriodicalIF\":8.9000,\"publicationDate\":\"2025-07-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Internet of Things Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11068146/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11068146/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
An Efficient and Revocable PUF-Based Authentication Scheme for Secure V2R Mutual Communication in VANETs
In vehicular ad hoc networks (VANETs), vehicles and roadside units (RSUs) utilize open wireless channels to exchange safety-critical data, facilitating real-time decision-making for enhanced road safety and traffic management efficiency in intelligent transportation systems (ITSs). However, the openness of these channels exposes them to various security threats. Malicious adversaries may impersonate RSUs to forge and distribute harmful commands, manipulating vehicular behavior, or masquerade as legitimate vehicles to bypass authentication protocols and gain unauthorized access. Such attacks jeopardize the security and functionality of the VANETs, underscoring the necessity of robust mutual authentication between vehicles and RSUs. Existing centralized trust authority (TA)-dependent schemes for vehicle-to-RSU (V2R) authentication incur high-computational overhead, introduce authentication latency, and cause a single point of failure, particularly in dense traffic scenarios. To address these challenges, we propose efficient, revocable authentication scheme with session key negotiation (ERAS2KN), an efficient and revocable authentication scheme with session key negotiation. By integrating physical unclonable functions (PUFs) with lightweight cryptography, such as one-way hash functions, bitwise xor, and symmetric encryption, ERAS2KN enables rapid mutual authentication and secure session key establishment. Comprehensive security analysis, including informal evaluation, formal security proof based on the real-or-random (RoR) model, and automated validation using AVISPA, confirms ERAS2KN’s resilience against vehicle impersonation, eavesdropping, vehicle/RSU compromise, man-in-the-middle, and other advance attacks. Performance evaluations demonstrate that ERAS2KN surpasses existing schemes by delivering enhanced security features while achieving the lowest computational overhead, communication overhead, and energy consumption cost, making it ideal for high-density VANETs environments.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.