Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs

نویسندگان

چکیده

Vehicular ad hoc networks (VANETs) are vulnerable to many kinds of security attacks, so it is necessary design an authenticated key agreement (AKA) scheme for securing communication channels in VANETs. Existing AKA schemes VANETs have not provided efficient and secure method V2V V2I communications simultaneously while meeting the privacy requirements. Further, few updating mechanisms, which secure, conditional privacy-preserving, practical, lightweight, exist current schemes. In this paper, we propose a proven VANETs, can be divided into two parts. The first part three-party authentication process vehicles, road side unit (RSU), trust authority (TA) authenticate each other. second process, used generation processes. For phase, tree-based algorithm that considers scenarios, i.e., joining vehicle leaving vehicle. formal proof analysis show our proposed satisfies session requirements respectively. performance demonstrates has advantage over several representative

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hybrid vehicular communications based on V2V-V2I protocol switching

In this paper, a hybrid communication paradigm for vehicular networking is presented in which connectivity is provided by both existing network infrastructure (e.g., wireless network access points) through a vehicle-to-infrastructure protocol and traditional vehicle-to-vehicle networking. Preexisting infrastructure can provide seamless connectivity, especially when vehicles are sparse or travel...

متن کامل

Secure key agreement for group communications

-Many key establishment protocols have been proposed for secure group communications. However, these protocols share the limitations that group members are not mutually authenticated, dynamic group membership is not considered, and the cost of key establishment is substantial. A secure key agreement protocol for group communications is proposed in this paper, which ensures the authenticity of g...

متن کامل

SAS-Based Authenticated Key Agreement

Key agreement protocols are frequently based on the Dif£e-Hellman protocol but require authenticating the protocol messages in two ways. This can be made by a cross-authentication protocol. Such protocols, based on the assumption that a channel which can authenticate short strings is available (SAS-based), have been proposed by Vaudenay. In this paper, we survey existing protocols and we propos...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Mobile Computing

سال: 2022

ISSN: ['2161-9875', '1536-1233', '1558-0660']

DOI: https://doi.org/10.1109/tmc.2021.3056712