4.7 Article

Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2017.2657649

Keywords

Intelligent transportation; Internet of Vehicles; vehicle-to-vehicle security; authentication framework; privacy-preserving

Funding

  1. Program for Innovation Team Building at Institutions of Higher Education in Chongqing [CXTDG201602010]
  2. University Outstanding Achievements Transformation Funding Project of Chongqing [KJZH17116]
  3. Social Livelihood Science and Technology Innovation Special Projects of Chongqing [cstc2016shmszx40001]
  4. China Post-Doctoral Fund [2014M562282]
  5. Wenfeng Leading Top Talent Project in CQUPT
  6. New Research Area Development Programme [A2015-44]
  7. Science and Technology Research Project of Chongqing Municipal Education Committee [KJ1400422, KJ1500441]
  8. Common Key Technology Innovation of Important Industry by Chongqing Science and Technology Commission [CSTC2015ZDCY-ZTZX40001]
  9. Collaborative Innovation Center for Information Communication Technology [002]
  10. [Xm2014039]

Ask authors/readers for more resources

The Internet of Vehicles (IoV) aims to provide a new convenient, comfortable, and safe driving way, and in turn enables intelligent transportation through wireless communications among road-side units, on-board units (OBUs), phones, and other devices inside a vehicle. However, significantly increasing reliance on wireless communication, control, and computing technology makes IoV more vulnerable to potential attacks, such as remote intrusion, control, and trajectory tracking. Therefore, efficient authentication solutions preventing unauthorized visitors need to be addressed to cope with these issues. Hence, in this paper we focus on the security and privacy-preserving by developing a dual authentication scheme for IoV according to its different scenarios. First, the OBU self-generates an anonymous identity and temporary encryption key to open an authentication session. Second, the legitimacy of the vehicle's real and anonymous identity can be verified by trust authority (TA). After that, the vehicle's reputation is evaluated according to its history interactive behavior and the session key for V2V can be finally established. There are three major advantages, including privacy-preserving and security enhancement without a burden of key management in the condition of acceptable time delay range, introducing trust evaluation into authentication protocol, as well as considering the vehicle behavior attributes in the new reputation evaluation method. In addition, we also prove the correctness of this scheme using the Burrows-Abadi-Needham (BAN) logic, and the performance comparison against the existing schemes is given as well.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available