浏览全部资源
扫码关注微信
1. 重庆邮电大学通信与信息工程学院,重庆 400065
2. 移动通信技术重庆市重点实验室,重庆 400065
3. 武汉大学电子信息学院,湖北 武汉 430072
[ "张海波(1979− ),男,重庆人,博士,重庆邮电大学副教授、硕士生导师,主要研究方向为车联网、区块链、安全认证等" ]
[ "黄宏武(1994− ),男,湖北孝感人,重庆邮电大学硕士生,主要研究方向为车联网、区块链、认证协议" ]
[ "刘开健(1981− ),女,重庆人,重庆邮电大学讲师,主要研究方向为区块链、安全认证等" ]
[ "贺晓帆(1985− ),男,河北保定人,博士,武汉大学教授,主要研究方向为资源优化、安全认证等" ]
网络出版日期:2021-06,
纸质出版日期:2021-06-25
移动端阅览
张海波, 黄宏武, 刘开健, 等. 车联网中可证安全的匿名可追溯快速组认证协议[J]. 通信学报, 2021,42(6):213-225.
Haibo ZHANG, Hongwu HUANG, Kaijian LIU, et al. Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles[J]. Journal on communications, 2021, 42(6): 213-225.
张海波, 黄宏武, 刘开健, 等. 车联网中可证安全的匿名可追溯快速组认证协议[J]. 通信学报, 2021,42(6):213-225. DOI: 10.11959/j.issn.1000-436x.2021073.
Haibo ZHANG, Hongwu HUANG, Kaijian LIU, et al. Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles[J]. Journal on communications, 2021, 42(6): 213-225. DOI: 10.11959/j.issn.1000-436x.2021073.
身份认证是车辆接入车联网(IoV)的第一道防线。然而现有方案还不能满足 IoV 的高效认证需求,也不能实现快速的匿名追溯。鉴于此,提出了一种 IoV 中双向匿名可追溯组认证协议。该协议先将多个路侧单元(RSU)进行快速动态的分组,并对进入 RSU 组的车辆利用切比雪夫混沌映射的单向陷门性和半群特性进行接入认证,当车辆在组内的RSU之间切换时采用反向哈希链进行快速切换认证。另外,组内RSU可以对恶意车辆进行身份的匿名追溯,并利用区块链对其身份进行快速撤销,还可以对泄露真实身份的用户进行ID的自由变更。同时运用随机预言机模型证明了协议的语义安全性。最后,通过仿真验证了该方案具有良好的安全性和有效性。
Identity authentication is the first line of defense for vehicles to access IoV (Internet of vehicles).However
the existing schemes cannot meet the requirements of efficient authentication of IoV well
nor can they realize fast anonymous traceability.In view of this
a bidirectional anonymous traceability group authentication protocol was proposed in IoV.In this protocol
a number of RSU (road side unit) were grouped quickly and dynamically.And the vehicles entering the RSU group were authenticated with the one-way trap gating property and semi-group property of Chebyshev chaotic map.When the vehicle switched between the RSU within a group
the reverse hash chain was used for fast handover authentication.In addition
the RSU within a group can trace anonymously and revoke the identity of malicious vehicles quickly by using blockchain
and can also freely change the ID of users who reveal their real identity.At the same time
the semantic security of the proposed protocol is proved by using the random predictor model.Finally
simulation results show the proposed scheme has good security and effectiveness.
VASUDEV H , DAS D . Work-in-progress:SAFE:secure authentication for future entities using Internet of vehicles [C ] // 2019 IEEE Real-Time Systems Symposium . Piscataway:IEEE Press , 2019 : 560 - 563 .
SUN Y C , WU L , WU S Z , et al . Security and privacy in the Internet of vehicles [C ] // 2015 International Conference on Identification,Information,and Knowledge in the Internet of Things . Piscataway:IEEE Press , 2015 : 116 - 121 .
TULADHAR K M , LIM K . Efficient and scalable certificate revocation list distribution in hierarchical VANETs [C ] // 2018 IEEE International Conference on Electro/Information Technology . Piscataway:IEEE Press , 2018 : 620 - 625 .
SUN G , SUN S Y , SUN J , et al . Security and privacy preservation in fog-based crowd sensing on the Internet of vehicles [J ] . Journal of Network and Computer Applications , 2019 , 134 : 89 - 99 .
FREUDIGER J , RAYA M , FELEGHHAZI M . Mix zones for location privacy in vehicular networks [C ] // ACM Workshop on Wireless Networking for Intelligent Transportation Systems . New York:ACM Press , 2007 : 1 - 7 .
LU R , LIN X , ZHU H , et al . ECPP:efficient conditional privacy preservation protocol for secure vehicular communications [C ] // IEEE INFOCOM 2008-The 27th Conference on Computer Communications . Piscataway:IEEE Press , 2008 : 1229 - 1237 .
ZHANG L , WU Q H , SOLANAS A , et al . A scalable robust authentication protocol for secure vehicular communications [J ] . IEEE Transactions on Vehicular Technology , 2010 , 59 ( 4 ): 1606 - 1617 .
JIANG Y X , SHI M H , SHEN X M , et al . BAT:a robust signature scheme for vehicular networks using binary authentication tree [J ] . IEEE Transactions on Wireless Communications , 2009 , 8 ( 4 ): 1974 - 1983 .
YAO L , LIN C , DENG J , et al . Biometrics-based data link layer anonymous authentication in VANETs [C ] // 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing . Piscataway:IEEE Press , 2013 : 182 - 187 .
JIANG S R , ZHU X Y , WANG L M . An efficient anonymous batch authentication scheme based on HMAC for VANETs [J ] . IEEE Transactions on Intelligent Transportation Systems , 2016 , 17 ( 8 ): 2193 - 2204 .
YING B D , NAYAK A . Anonymous and lightweight authentication for secure vehicular networks [J ] . IEEE Transactions on Vehicular Technology , 2017 , 66 ( 12 ): 10626 - 10636 .
LIU J W , LI Q Q , SUN R , et al . An efficient anonymous authentication scheme for Internet of vehicles [C ] // 2018 IEEE International Conference on Communications . Piscataway:IEEE Press , 2018 : 1 - 6 .
ZHAO D W , PENG H P , LI L X , et al . A secure and effective anonymous authentication scheme for roaming service in global mobility networks [J ] . Wireless Personal Communications , 2014 , 78 ( 1 ): 247 - 269 .
CUI J , WANG Y L , ZHANG J , et al . Full session key agreement scheme based on chaotic map in vehicular ad hoc networks [J ] . IEEE Transactions on Vehicular Technology , 2020 , 69 ( 8 ): 8914 - 8924 .
LI G S , JIANG Q , WEI F S , et al . A new privacy-aware handover authentication scheme for wireless networks [J ] . Wireless Personal Communications , 2015 , 80 ( 2 ): 581 - 589 .
ZENG Y B , GUANG H , LI G S . Attribute-based anonymous handover authentication protocol for wireless networks [J ] . Security and Communication Networks , 2018 , 2018 : 1 - 9 .
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system [R ] . Cryptography Mailing , 2008 .
SHARMA V . An energy-efficient transaction model for the blockchain-enabled Internet of vehicles (IoV) [J ] . IEEE Communications Letters , 2019 , 23 ( 2 ): 246 - 249 .
BAGGA P , DAS A K , WAZID M , et al . Authentication protocols in Internet of vehicles:taxonomy,analysis,and challenges [J ] . IEEE Access , 2020 , 8 : 54314 - 54344 .
YANG J L , WANG D H . Applying extended chebyshev polynomials to construct a trap-door one-way function in real field [C ] // 2009 First International Conference on Information Science and Engineering . Piscataway:IEEE Press , 2009 : 1680 - 1682 .
CASTRO M , LISKOV B . Practical Byzantine fault tolerance [C ] // Proceedings of the Third Symposium on Operating Systems Design and Implementation . New York:ACM Press , 1999 : 173 - 186 .
CHEN Z L , CHEN S Z , XU H , et al . A security authentication scheme of 5G ultra-dense network based on block chain [J ] . IEEE Access , 2018 , 6 : 55372 - 55379 .
HU W , HU Y W , YAO W H , et al . A blockchain-based Byzantine consensus algorithm for information authentication of the Internet of vehicles [J ] . IEEE Access , 2019 , 7 : 139703 - 139711 .
郑敏 , 王虹 , 刘洪 , 等 . 区块链共识算法研究综述 [J ] . 信息网络安全 , 2019 ( 7 ): 8 - 24 .
ZHENG M , WANG H , LIU H , et al . Survey on consensus algorithms of blockchain [J ] . Netinfo Security , 2019 ( 7 ): 8 - 24 .
BRESSON E , CHEVASSUT O , POINTCHEVAL D . Security proofs for an efficient password-based key exchange [C ] // Proceedings of the 10th ACM Conference on Computer and Communication Security . New York:ACM Press , 2003 : 241 - 250 .
屈娟 , 冯玉明 , 李艳平 , 等 . 可证明安全的面向无线传感器网络的三因素认证及密钥协商方案 [J ] . 通信学报 , 2018 , 39 ( S2 ): 189 - 197 .
QU J , FENG Y M , LI Y P , et al . Provably secure three-factor authentication and key agreement scheme for wireless sensor network [J ] . Journal on Communications , 2018 , 39 ( S2 ): 189 - 197 .
0
浏览量
754
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构