计算机科学
重放攻击
计算机网络
认证(法律)
计算机安全
随机预言
安全通信
身份验证协议
公钥密码术
加密
作者
Chanchal Maurya,Vijay Kumar Chaurasiya
出处
期刊:IEEE Transactions on Intelligent Transportation Systems
[Institute of Electrical and Electronics Engineers]
日期:2023-09-01
卷期号:24 (9): 9670-9683
被引量:8
标识
DOI:10.1109/tits.2023.3271355
摘要
The Internet of Vehicles (IoV) has emerged as a robust solution to improve real-time road traffic conditions, safety, and driving comfort. However, the road’s dynamic environment and network heterogeneity make communication insecure. It poses many security threats like man-in-the-middle attacks, impersonation attacks, replay attacks, etc. Therefore, the message exchanges and real identities of nodes over the IoV network need to be preserved. The existing authentication schemes are inefficient and incur computational and communication overhead. They are unsuitable for resource-constrained IoV networks due to their highly dynamic nature, open communication, and chaotic road environment. Therefore, this paper proposes an elliptic curve cryptography-based secure and efficient anonymous batch authentication scheme with conditional privacy (EABAS-CP) for the IoV environment. The EABAS-CP scheme achieves conditional privacy by tracing the malicious vehicle efficiently. The RSU’s distributed parameters generate a pseudo-identity for vehicles and unique signatures that do not require secure channels and trusted authorities (TAs) for secure communication. Furthermore, the EABAS-CP scheme supports batch signature verification in which multiple signatures can be verified simultaneously and efficiently. The Random Oracle Model (RoM) provides unforgeability against adaptive message attacks by using the Elliptic Curve Discrete Logarithm Problem (ECDLP). The AVISPA simulation tool is used to evaluate the proposed protocol for its reliability and protection from the attacks like man-in-the-middle and replay attacks. The proposed EABAS-CP scheme is also proven secure against replay, impersonation, stolen verifier, ephemeral secret leakage, and linkability attacks. The network performance of the EABAS-CP scheme has been evaluated in terms of end-to-end delay, throughput, average message delay, average message loss ratio, communication cost, and computation cost through the NS-2 simulator and compared with existing schemes to demonstrate its efficiency.
科研通智能强力驱动
Strongly Powered by AbleSci AI