4.7 Article

SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2020.3044855

Keywords

Authentication; Security; Cloud computing; Servers; Urban areas; Hash functions; Protocols; Vehicular networks; authentication; security; many-to-many; session key (SK)

Funding

  1. National Natural Science Foundation of China [61872001, 62011530046, U1936220]
  2. NSFC [62011530046, 20-57-53019]
  3. RFBR [62011530046, 20-57-53019]
  4. Open Fund of Key Laboratory of Embedded System and Service Computing, Tongji University, Ministry of Education [ESSCKF2018-03]
  5. Open Fund for Discipline Construction, Institute of Physical Science and Information Technology, Anhui University
  6. Excellent Talent Project of Anhui University

Ask authors/readers for more resources

The article introduces a many-to-many authentication and key agreement scheme that can achieve secure authentication between vehicles and cloud service providers in vehicular network environments. The proposed scheme prevents unauthorized access, improves service efficiency, and reduces computation and communication overhead.
With the rising popularity of the Internet and communication technology, vehicles can analyze and judge the real-time data collected by various cloud service providers (CSPs) in a vehicular network. However, in a vehicular network environment, real-time data are transmitted via wireless channels, which can lead to security and privacy issues. To avoid illegal access by adversaries, vehicle authentication and key agreement mechanism has been considered as one of the promising security measures in vehicular network environments. Besides, most of the solutions focus on authentication between one vehicle and one CSP. In such strategies, the implementation of efficient authentication for multiple vehicles and CSPs simultaneously is usually challenging. Further, they are also subjected to performance limitations due to the overhead incurred. To solve these issues, we propose a many-to-many authentication and key agreement scheme for secure authentication between multiple vehicles and CSPs. The proposed scheme can prevent unauthorized access and provide SK-security even if temporary information is leaked. To improve the service, the CSP only needs to broadcast an anonymous message periodically instead of having to generate a unique anonymous message for each of vehicles. Similarly, when a vehicle wants to request the services of m CSPs, it only needs to send one request message instead of m. Therefore, the proposed scheme not only implements many-to-many communication but also significantly reduces the computation and communication overhead. Moreover, a thorough security analysis shows that the proposed scheme provides better security compared to other related schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available