4.7 Article

Three-factor authentication protocol using physical unclonable function for IoV

期刊

COMPUTER COMMUNICATIONS
卷 173, 期 -, 页码 45-55

出版社

ELSEVIER
DOI: 10.1016/j.comcom.2021.03.022

关键词

Internet of Vehicles; PUF; Physical attack; Mutual authentication; Three-factor authentication

资金

  1. National Natural Science Foundation of China [62072352, U1708262, 61902290, 61772008]
  2. project The Verification Platform of Multi-tier Coverage Communication Network for oceans [LZC0020]
  3. Fundamental Research Funds for the Central Universities, China [JBF211503]
  4. Education Department of Shaanxi Province, China [20JY016]
  5. Guangxi Key Laboratory of Trusted Software, China [KX202035]
  6. Natural Science Foundation of Guangxi Province, China [2019GXNSFBA245049]

向作者/读者索取更多资源

Internet of Vehicles (IoV) plays a crucial role in transportation sector, but security and privacy issues are pressing. The integration of physical unclonable function (PUF) technology ensures system security, and the combination of password, biometrics, and PUF prevents unauthorized access to user devices.
As an extension of Internet of Things (IoT) in transportation sector, the Internet of Vehicles (IoV) can greatly facilitate vehicle management and route planning. With ever-increasing penetration of IoV, the security and privacy of driving data should be guaranteed. Moreover, since vehicles are often left unattended with minimum human interventions, the onboard sensors are vulnerable to physical attacks. Therefore, the physically secure authentication and key exchange (AKE) protocol is urgently needed for IoV to implement access control and information protection. In this paper, physical unclonable function (PUF) is introduced in the AKE protocol to ensure that the system is secure even if the user devices or sensors are compromised. Specifically, PUF, as a hardware fingerprint generator, eliminates the storage of any secret information in user devices or vehicle sensors. By combining password, biometrics with PUF, the user device cannot be used by someone else to be successfully authenticated as the user. Finally, the elaborate security analysis demonstrates that the proposed protocol is free from the influence of known attacks and can achieve expected security properties, and the performance evaluation indicates the efficiency of our protocol.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据