4.8 Article

A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 8, 期 18, 页码 14248-14257

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3068268

关键词

Biometric based; emergency vehicle (EV) avoidance; lightweight authentication; vehicular ad hoc networks (VANETs)

资金

  1. National Natural Science Foundation of China [61922045, 61877034, U1836115, 61672290]
  2. Natural Science Foundation of Jiangsu Province [BK20181408]
  3. Peng Cheng Laboratory Project of Guangdong Province [PCL2018KP004]
  4. 2020 Research Innovation Program for Postgraduates of Jiangsu Province [KYCX20-0936]
  5. State Scholarship Fund by the China Scholarship Council [202008320536]
  6. Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology fund
  7. Priority Academic Program Development of Jiangsu Higher Education Institutions fund

向作者/读者索取更多资源

This article proposes a novel lightweight authentication protocol to avoid emergency vehicles in VANETs. The protocol is efficient in reducing mission delays caused by traffic congestion.
The delay of vehicle emergency has led to many serious consequences. A series of studies has been carried out in the field of information security in vehicular ad hoc networks (VANETs). However, open issues such as the authentication of emergency vehicle (EV) avoidance are remaining unsolved. In this article, we propose a novel lightweight authentication protocol to avoid EVs in VANETs. In our protocol, after completing the first mutual authentication with the nearest roadside unit (RSU), EV can complete the mutual identity authentication with the subsequent RSUs without repeating cumbersome calculations. Additionally, EV is required to verify the legitimacy of the driver's identity when starting to avoid some illegal driving behavior. The RSUs will broadcast avoidance information to ordinary vehicles in their jurisdiction to remind them to clear a temporary emergency lane for EVs in advance. With temporary emergency lanes, emergent mission delays due to traffic congestion could be reduced. The security analysis and efficient analysis prove that our protocol is practical and efficient against attacks, such as impersonation attacks, device theft attacks, reputation attacks, etc.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据