Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs
نویسندگان
چکیده
Vehicular ad hoc networks (VANETs) are vulnerable to many kinds of security attacks, so it is necessary design an authenticated key agreement (AKA) scheme for securing communication channels in VANETs. Existing AKA schemes VANETs have not provided efficient and secure method V2V V2I communications simultaneously while meeting the privacy requirements. Further, few updating mechanisms, which secure, conditional privacy-preserving, practical, lightweight, exist current schemes. In this paper, we propose a proven VANETs, can be divided into two parts. The first part three-party authentication process vehicles, road side unit (RSU), trust authority (TA) authenticate each other. second process, used generation processes. For phase, tree-based algorithm that considers scenarios, i.e., joining vehicle leaving vehicle. formal proof analysis show our proposed satisfies session requirements respectively. performance demonstrates has advantage over several representative
منابع مشابه
Hybrid vehicular communications based on V2V-V2I protocol switching
In this paper, a hybrid communication paradigm for vehicular networking is presented in which connectivity is provided by both existing network infrastructure (e.g., wireless network access points) through a vehicle-to-infrastructure protocol and traditional vehicle-to-vehicle networking. Preexisting infrastructure can provide seamless connectivity, especially when vehicles are sparse or travel...
متن کاملSecure key agreement for group communications
-Many key establishment protocols have been proposed for secure group communications. However, these protocols share the limitations that group members are not mutually authenticated, dynamic group membership is not considered, and the cost of key establishment is substantial. A secure key agreement protocol for group communications is proposed in this paper, which ensures the authenticity of g...
متن کاملSAS-Based Authenticated Key Agreement
Key agreement protocols are frequently based on the Dif£e-Hellman protocol but require authenticating the protocol messages in two ways. This can be made by a cross-authentication protocol. Such protocols, based on the assumption that a channel which can authenticate short strings is available (SAS-based), have been proposed by Vaudenay. In this paper, we survey existing protocols and we propos...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Mobile Computing
سال: 2022
ISSN: ['2161-9875', '1536-1233', '1558-0660']
DOI: https://doi.org/10.1109/tmc.2021.3056712